EP1155365A1 - Techniques for implementing security on a small footprint device using a context barrier - Google Patents

Techniques for implementing security on a small footprint device using a context barrier

Info

Publication number
EP1155365A1
EP1155365A1 EP00904409A EP00904409A EP1155365A1 EP 1155365 A1 EP1155365 A1 EP 1155365A1 EP 00904409 A EP00904409 A EP 00904409A EP 00904409 A EP00904409 A EP 00904409A EP 1155365 A1 EP1155365 A1 EP 1155365A1
Authority
EP
European Patent Office
Prior art keywords
context
applet
jcre
card
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP00904409A
Other languages
German (de)
French (fr)
Other versions
EP1155365B1 (en
Inventor
Joshua Susser
Mitchel B. Butler
Andy Streich
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oracle America Inc
Original Assignee
Sun Microsystems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=22884338&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP1155365(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Sun Microsystems Inc filed Critical Sun Microsystems Inc
Priority to EP04005586.5A priority Critical patent/EP1434121B1/en
Publication of EP1155365A1 publication Critical patent/EP1155365A1/en
Application granted granted Critical
Publication of EP1155365B1 publication Critical patent/EP1155365B1/en
Anticipated expiration legal-status Critical
Revoked legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register

Definitions

  • the invention relates to computer security and more particularly to techniques for implementing a security on small footprint devices, such as smart cards.
  • Examples of these include the C++ language and the Smalltalk language.
  • JAVATM language Another such object oriented language is the JAVATM language. This language is described in the book JavaTM Language Specification, by James Gosling et al. and published by Addison- Wesley. This work is incorporated herein by reference in its entirety.
  • the JAVATM language is particularly well suited to run on a JavaTM Virtual Machine
  • a number of small footprint devices are also well known in the art. These include smart cards, cellular telephones, and various other small or miniature devices.
  • Smart cards are similar in size and shape to a credit card but contain, typically, data processing capabilities within the card (e.g. a processor or logic performing processing functions) and a set of contacts through which programs, data and other communications with the smart card may be achieved.
  • the set of contacts includes a power source connection and a return as well as a clock input, a reset input and a data port through which data communications can be achieved.
  • a card acceptance device is typically a peripheral attached to a host computer and contains a card port, such as a slot, in to which a smart card can be inserted. Once inserted, contacts or brushes from a connector press against the surface connection area on the smart card to provide power and to permit communications with the processor and memory typically found on a smart card.
  • Java CardTM platform A subset of the full JavaTM platform capabilities has been defined for small footprint devices, such as smart cards. This subset is called the Java CardTM platform. The uses of the Java CardTM platform are described in the following publications.
  • a computing environment which provides multiple execution contexts also needs to provide a mechanism for associating any given executing code with its corresponding context.
  • a current context Certain computing environments that support multiple contexts will, at any given time, treat one context in particular as an active focus of computation. The context can be referred to as the "current context.” When the current context changes, so that some other context becomes the current context, a "context switch" is said to occur.
  • these computing environments provide mechanisms for keeping track of which context is the current one and for facilitating context switching.
  • sandbox model One layer of security protection utilized by the JavaTM platform is commonly referred to as a sandbox model. Untrusted code is placed into a “sandbox” where it can “play” safely without doing any damage to the "real world” or full JavaTM environment. In such an environment, JavaTM applets don't communicate, but each has its own name space.
  • Some smart card operating systems don't permit execution contexts to communicate directly, but do permit communications through an operating system, or through a server.
  • One of the compelling problems is the existence of very limited memory space. This requires often extraordinary efforts to provide needed functionality within the memory space.
  • a second problem associated with small footprint devices is the fact that different small footprint device manufacturers can utilize different operating systems. As a result, applications developed for one operating system are not necessarily portable to small footprint devices manufactured by a different manufacturer.
  • the invention is directed to providing a context barrier (sometimes referred to as a firewall) for providing separation and isolation of one context from another and to provide controlled access across the barrier when that is needed.
  • a context barrier sometimes referred to as a firewall
  • two execution contexts e.g. each containing one or more applets, running in the same logical (i.e., virtual or real) machine, protected from each other, can share information in a controlled, secure way, using language mechanisms, such as object-oriented language mechanisms.
  • Security can be, for example, object by object.
  • an enhanced JavaTM Virtual Machine provides certain run-time checks of attempted access across execution contexts in the VM. Checks can be automatic by the VM or coded by the programmer with support from the VM. This can be done using language-level communication mechanisms. In this way, one can express object access across execution contexts in the same way as other object accesses using the language are made. These run-time checks provide a second dimension of defense/security beyond that which the JavaTM language and platform already provide. These mechanisms provide protection against, e.g., security holes due to programming bugs (such as declaring a datum "public” (global) when it shouldn't be accessible to all contexts). They also allow fine-grain control of sharing (such as selection of objects to share and applets to share to).
  • the invention is also directed to computer program products and carrier waves related to the other aspects of the invention.
  • Figure 1 is an illustration of a computer equipped with a card acceptance device and of a smart card for use with the card acceptance device.
  • Figure 2 is an illustration of a computer equipped with a card acceptance device connected to a network.
  • Figure 3 is an exemplary hardware architecture of a small footprint device, such as a smart card, of the prior art.
  • Figure 4 illustrates objects being accessed by principals as done in the prior art.
  • Figure 5 is an exemplary security model which can be used in explaining the various embodiments of the invention.
  • Figure 6 is a block diagram showing separation of execution contexts by a firewall or context barrier in accordance with one aspect of the invention.
  • Figure 7 is a representation of a software architecture useful in carrying out the invention.
  • Figure 8 is a flow chart of a security enforcement process implementing a firewall in accordance with one aspect of the invention.
  • Figure 9 is a block diagram showing object access across a firewall in accordance with one aspect of the invention.
  • Figure 10 is a block diagram showing cascaded object access across a firewall.
  • Figure 11 is a flow chart of a process for permitting access by a principal in one context across a firewall into another context.
  • Figure 12 is a block diagram illustrating the use of an entry point object to permit access across a firewall.
  • Figure 13 is a block diagram illustrating the use of a global data structure such as an array for access across a firewall.
  • Figure 14 is a block diagram illustrating the use of a supercontext to permit access across a firewall.
  • Figure 15 is a block diagram illustrating the use of shareable interface objects to permit access across a firewall.
  • Figure 16 is a flow chart of a security enforcement process permitting access across a firewall.
  • Figure 17 is the flow chart of Figure 16 showing details of block 1620.
  • Figure 18 is a flow chart showing an exemplary implementation of block 1629 of Figure 17.
  • a procedure is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. These steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It proves convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be noted, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
  • the manipulations performed are often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations described herein which form part of the present invention; the operations are machine operations.
  • Useful machines for performing the operation of the present invention include general purpose digital computers or other computational devices.
  • the present invention also relates to apparatus for performing these operations.
  • This apparatus may be specially constructed for the required purpose or it may comprise a general purpose computer as selectively activated or reconfigured by a computer program stored in the computer.
  • the procedures presented herein are not inherently related to a particular computer or other apparatus.
  • Various general purpose machines may be used with programs written in accordance with the teachings herein, or it may prove more convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these machines will appear from the description given.
  • Figure 1 is an illustration of a computer 120 equipped with a card acceptance device 110 and a smart card 100 for use with the card acceptance device 110.
  • the smart card 100 is inserted into card acceptance device 110 and power and data connections applied through a set of contacts 105 accessible at the surface of the smart card 100.
  • mating contacts from the card acceptance device 110 interconnect with the surface contacts 105 to power-up the card and permit communications with the onboard processor and memory storage.
  • FIG 2 is an illustration of a computer equipped with a card acceptance device, such as 120 in Figure 1, connected to a network 200. Also connected to a network are a plurality of other computing devices, such as server 210. It is possible to load data and software onto a smart card over the network 200 using card equipped device 120. Downloads of this nature can include applets or other programs to be loaded onto a smart card as well as digital cash and other information used in accordance with a variety of electronic commerce and other applications.
  • the instructions and data used to control processing elements of the card acceptance device and of the smart card may be stored in volatile or non-volatile memory or may be received directly over a communications link, e.g., as a carrier wave containing the instructions and/or data.
  • the network can be a LAN or a WAN such as the Internet or other network.
  • FIG 3 is an exemplary hardware architecture of a small footprint device, such as a smart card, of the prior art.
  • a processor 300 interconnects with primary storage 310 which may include read only memory 315 and/or random access memory 316.
  • the processor also connects with a secondary storage 320 such as EEPROM and with an input/output 330, such as a serial port.
  • primary storage 310 may include read only memory 315 and/or random access memory 316.
  • the processor also connects with a secondary storage 320 such as EEPROM and with an input/output 330, such as a serial port.
  • EEPROM electrically programmable read only memory
  • input/output 330 such as a serial port
  • Figure 4 illustrates objects being accessed by principals as done in the prior art.
  • physical device 400 such as the small footprint device may have contained within it one or more processing machines (virtual or physical) which are running an execution context 420.
  • the execution context may be, for example, a context associated with a particular applet.
  • One or more principals 430 e.g., applets or applications
  • Figure 5 is an exemplary security model which can be used in explaining the various embodiments of the invention. It is just one of many models which might be utilized but is a convenient model for this purpose.
  • a principal (sometimes called entity) 500 proposes to take an action 510 on an object, such as object 520.
  • Security checks may be imposed on the principal, on the object, and/or on the action proposed to be taken.
  • object 520 two types of objects are shown on which action may be taken by a principal. These include data objects, (e.g. datal and data2 (520, 520')) and entity 530.
  • a principal may operate or attempt to operate on any of these objects.
  • an entity 530 While data is passive, an entity 530 is active.
  • the diagram line from Principal to an active entity is also labeled "action,” but this could be a more sophisticated and arbitrarily complex action, such as making a function or method call or sending a message as compared with action on a data object.
  • action a security check enforced by the operating system may use the identity of the principal, the identity of the entity, and/or the type of action.
  • the entity, being active can perform its own additional security checks. These can be as arbitrarily complex as one desires, and can make use of the identity of the Principal, the identity of the entity itself, the action, and/or any other information that is available.
  • objects are typically a combination of data and entity.
  • object-oriented system such as the Java CardTM platform
  • objects are typically a combination of data and entity.
  • a Principal tries to access a field of an object this is a data access—a fairly simple action protected by a fairly simple security check.
  • a Principal tries to access a method of an object this is an entity access, which can be arbitrarily complex both in action and in security check.
  • FIG 6 is a block diagram showing separation of execution contexts by a firewall or context barrier in accordance with one aspect of the invention.
  • the physical device 400 and the machine 410 correspond to the same items shown in Figure 4.
  • An execution context 420 shows one principal 430 attempting to access object 440 within the context. This access would normally succeed. However, execution context 420 also shows a principal 630 attempting to access object 640 of execution context 620, across a context barrier 600. Normally, this access would be prohibited as indicated by the X 636 where the action 635 crosses the context barrier 600.
  • Figure 7 is a representation of a software architecture useful in carrying out the invention. This software architecture is shown as a run time environment 700. An operating system 710 for the small footprint device is commonly used.
  • a virtual machine 720 in an exemplary embodiment of the invention, is implemented over the operating system.
  • the virtual machine could be a Java CardTM virtual machine or other virtual machine.
  • the capabilities of a standard virtual machine can be expanded to provide the additional functionality described herein or the functionality can be provided as separate modules.
  • the virtual machine 720 may include an interpreter or native implementation 730 which provides access to a run time system 740.
  • the run time system includes object system 750 for managing the objects of an object oriented implementation.
  • Three contexts, 760, 770 and 780, are shown. Each context is separated from the other by a context barrier (sometimes referred to as a firewall) between the execution contexts.
  • Context 760 is, in one specific embodiment, a supercontext. That is, context 760 has privileges and capabilities not available to subordinate contexts 770 and 780, potentially including privileges to create entry point objects or global data structures, and to access objects in subordinate contexts 770 and 780.
  • Every object is associated with one particular context. That context is said to own each object that is associated with it.
  • the runtime system 740 provides a means for uniquely identifying contexts, and a means for specifying and identifying the currently executing context.
  • the object system 750 provides a mechanism for associating objects with their owning contexts.
  • the runtime 740 can identify contexts with a unique name, and correspondingly the object system 750 can associate objects with that context by recording the context's name in the object's header. Information in the object's header cannot be accessed by programs written in the object-oriented language, but is only available to the virtual machine 720 itself. Alternately, the runtime system 740 can identify contexts by dividing the memory space into separate regions, each for a particular context, and correspondingly the object system 750 can associate objects with that context by allocating the object's storage in that context's memory space.
  • Figure 8 is a flow chart of a security enforcement process implementing a context barrier in accordance with one aspect of the invention.
  • a principal invokes an action on an object (800) a check is made to determine whether the object is within the context of the principal (810). If it is not, the action is disallowed (840). Otherwise, the action is permitted (830). This is the simplest form of context barrier or firewall. In one specific embodiment the action is disallowed (840) by throwing a security exception if the object is outside of the namespace or the memory space of the context requesting access.
  • Figure 9 is a block diagram showing object access across a firewall in accordance with one aspect of the invention.
  • Figure 9 is substantially similar to Figure 6.
  • Figure 9 also shows principal 900 seeking to access object 910 in order to perform action 905 on the object 910.
  • action 905 is permitted to occur across the firewall through access point 920 so that principal 900 can perform action 905 on object 910 notwithstanding the fact that the principal and the object are in different execution contexts.
  • the mechanisms behind access point 920 are described below with reference to Figures 12-18.
  • access point 920 can coexist with obstructed accesses such as X 636.
  • access point 920 provides fine- grain control of sharing (object by object security) across context barrier 600.
  • the current context setting is context 420. If the object 910 is a data object, the action 905 is a simple data access, and no code is executed in the second context 620. If the object 910 is an entity object, and the action 905 results in that object's code being executed, that code is executed in the second context 620. To execute the code of object 910 in the correct context 620, the virtual machine 410 performs a context switch. The context switch changes the current context setting to be context 620, and the previous value of the current context setting is stored so that it can be restored later. From that point on code will execute in the new current context. When the action 905 completes, control is returned to the point following access 900. During the return, the virtual machine 410 must restore the value of the current context setting to its previous value.
  • Figure 10 is a block diagram showing cascaded object accesses across a firewall.
  • Figure 10 shows three execution contexts, 1000, 1010 and 1020.
  • Principal 1030 in execution context 1 seeks to invoke an action 1035 on object 1050 in execution context 2 and does so through access point 1070 in context barrier 600.
  • Object 1050 in execution context 2 has an object access 1040 which seeks to perform an action 1045 on the object 1060 in execution context 3. It achieves this by using access point 1080 in context barrier 600' separating execution contexts 2 and 3.
  • Object 1050 in execution context 2 also has another object access 1090 which invokes an action 1095 on an object 1099 in the same execution context, that is, in execution context 2.
  • Both actions 1035 and 1045 result in context switches as described in the explanation of Figure 9. But as action 1095 does not cross the context barrier, a context switch is not required for its execution, and therefore does not occur.
  • Figure 11 is a flow chart of a process for permitting access by a principal in one context across a firewall into another context.
  • execution context 2 an object to be accessed is created and designated as shared (1100).
  • execution context 1 the principal obtains a reference to the object in execution context 2 (1110).
  • the principal in execution context 1 then invokes an action upon the object designated as shared in context 2 (1120).
  • this can be done, in accordance with a specific embodiment of the invention, by including a shareable attribute in the header of an object's representation. Information in an object's header cannot be accessed by programs written in the object-oriented language, but is only available to the VM itself.
  • Obtaining a reference to an object in another context is a special case of accessing an object in another context.
  • a mechanism that provides access to an object in another context can make other objects available also. For instance, invoking a method on an object in another context may return a reference to a second object in a different context.
  • An additional mechanism is required to allow an initial reference to an object in a different context to be obtained.
  • references to certain well-known entry point objects can be obtained using a public API. Once the initial reference to an object in a different context is obtained, further references can be obtained from that object, and so on.
  • Figure 12 is a block diagram illustrating the use of entry point objects to permit access across a context barrier.
  • some object 1200 in context 770 desires access to information in supercontext 760.
  • a supercontext 760 contains at least one entry point object 1210.
  • the entry point object 1210 can be published as part of a public API, or can be made available indirectly through a published API (e.g., in accordance with the mechanisms described previously with reference to Figure 11), so that each context subordinate to the supercontext may communicate with the entry point object of the supercontext. (It will be appreciated that in other embodiments, entry point objects may be housed by a context other than the supercontext.)
  • FIG. 13 is a block diagram illustrating the use of global data structures to permit access across a firewall.
  • supercontext 760 creates a global data structure such as a global array.
  • supercontext 760 is the only context permitted to create such a global data structure.
  • global data may be housed by a context other than the supercontext.
  • each of the contexts 770 and 780 may read and write to the global data structure.
  • information written into the global data structure by one context can be read by another context.
  • this mechanism can be used to pass binary data or references to objects between contexts.
  • Figure 14 is a block diagram illustrating the use of supercontext privileges to permit access across a context barrier.
  • an object in supercontext 760 seeks access to context 780 across the context barrier separating the two.
  • Supercontext 760 can invoke any of the methods of context 780 and can access any of the data contained within context 780, by virtue of the privileges associated with the supercontext.
  • Figure 15 is a block diagram illustrating the use of shareable interface objects to permit access across a firewall.
  • a shareable interface defines a set of shareable interface methods.
  • a shareable interface object is an object that implements at least the set of methods defined in a shareable interface.
  • object 1210 in context 2 (780) is a shareable interface object.
  • An object access 1200 in another context 770 can invoke any of the shareable interface methods on the object 1210 if the principal of the object access 1200 is authorized to do so by the object 1210 itself. This authorization is further discussed with reference to Figure 18 below.
  • a virtual machine consistent with the invention provides functionality beyond that of earlier virtual machines, such as the virtual machine described in the JavaTM Virtual Machine Specification.
  • the virtual machine provides functionality to implement or to facilitate a security enforcement process that permits access across a firewall. This process is described next with reference to Figures 16-18. Note that it is applicable to any approach for providing access across the firewall, including but not limited to the four approaches described with reference to Figures 12-15 above.
  • Figure 16 is a flow chart of a security enforcement process permitting access across a firewall.
  • a principal attempts to invoke action on an object 1600
  • a check is made to determine if the object is within the context of the principal (1610). If it is, (1610-Y), the action is permitted (1630). If it is not, (1610-N), a check is made to see if the action by the principal is permitted on the object (1620). If it is, (1620-Y), the action is permitted (1630). If it is not, (1620-N), the action is disallowed. In the specific embodiment a security exception is thrown (1640).
  • Figure 17 is the flow chart of Figure 16 showing further details of block 1620. If the object is not within the context of the principal (1610-N), a plurality of tests, 1621,
  • 1622, 1623... 1629 are undertaken to see if the action by the principal is permitted on the object. These tests can be done by the virtual machine alone or by the virtual machine plus the object, in a virtual machine object oriented implementation. If any of the tests results in a pass, the action is permitted (1630). However, if all tests result in a negative determination (162X ⁇ No), the action will be disallowed. In a specific embodiment, a security exception will be thrown (1640). These tests relate to the permitted access discussed in conjunction with Figures 12-15.
  • Figure 18 is a flow chart showing an exemplary implementation of block 1629 of Figure 17 for use with access method described in Figure 15.
  • a virtual machine checks if the object is a shared object 1810. If it is not (1810-
  • the test will fail. However, if it is (1810-Yes), the virtual machine will invoke the method A on object O (1820). If the method A on object O determines that the principal is authorized (1830), the test will be passed (1840) and access permitted. Otherwise, the test will fail (1850). This allows the authorization text to be programmed into the code of the object itself.
  • the invention has been illustrated with respect to a smart card implementation, the invention applies to other devices with a small footprint, not just to smart cards. Devices with a small footprint are generally considered to be those that are restricted or limited in memory or in computing power or speed. Such small footprint devices may include boundary scan devices, field programmable devices, pagers and cellular phones among many others.
  • small footprint devices are resource constrained computational devices and systems where secure interoperation of execution contexts is a concern. Such small devices impose constraints on the implementation of security measures because of their limited resources. Because of resource constraints, in a virtual machine implementation, a single virtual or physical machine must be used as opposed to multiple virtual machines.
  • the invention may also be applied to devices with larger footprints where the characteristics of the invention may prove beneficial.
  • the invention may prove advantageous when using servlets if there is object sharing between them. Even some desktop systems may profitably utilize the techniques of the invention.
  • JavaTM language and platform are suitable for the invention, any language or platform having certain characteristics would be well suited for implementing the invention. These characteristics include type safety, pointer safety, object-oriented, dynamically linked, and virtual-machine based. Not all of these characteristics need to be present in a particular implementation. In some embodiments, languages or platforms lacking one or more of these characteristics may be utilized.
  • a "virtual machine” could be implemented either in bits (virtual machine) or in silicon (real/physical machines).
  • Sun Microsystems, Inc hereby grants to you at no charge a nonexclusive, nontransferable, worldwide, limited license (without the right to subhcense) under SUN's intellectual property rights that are essential to practice the Java TM Card TM Runtime Environment (JCRE) 2 1 Specification ("Specification") to use the Specification for internal evaluation purposes only Other than this limited license, you acquire no ⁇ ght, title, or interest in or to the Specification and you shall have no right to use the Specification for productive or commercial use
  • Sun the Sun logo, Sun Microsystems, JavaSoft, JavaBeans, JDK, Java, Java Card, Ho ⁇ ava, HoUava Views, Visual Java, Solans, NEO, Joe, Netra, NFS, ONC, ONC+, Open Windows, PC-NFS, EmbeddedJava, PersonalJava, SNM, SunNet Manager, Solans sunburst design, Solstice, SunCore, SolarNet, Sun Web, Sun Workstation, The Network Is The Computer, ToolTalk, Ultra, Ultracomputing, Ultraserver, Where The Network Is Going, Sun Workshop, XView, Java Workshop, the Java Coffee Cup logo, and Visual Java are trademarks or registered trademarks of Sun Microsystems, Inc in the United States and other countries
  • JavaTM CardTM technology combines a portion of the Java programming language with a runtime environment optimized for smart cards and related, small-memory embedded devices
  • the goal of Java Card technology is to bnng many of the benefits of Java software programming to the resource-constrained world of smart cards
  • Java Card Runtime Environment JCRE
  • a vendor of a Java Card- enabled device provides an implementation of the JCRE
  • a JCRE implementation within the context of this specification refers to a vendor's implementation of the Java Card Virtual Machine (VM), the Java Card Application Programming Interface (API), or other component, based on the Java Card technology specifications
  • VM Java Card Virtual Machine
  • API Java Card Application Programming Interface
  • Java Card applets wntten for the Java Card platform are referred to as Java Card applets
  • This specification is mtended to assist JCRE implementers in creating an implementation, developing a specification to extend the Java Card technology specifications, or in creating an extension to the Java Card Runtime Environment (JCRE) This specification is also mtended for Java Card applet developers who want a greater understanding of the Java Card technology specifications
  • Glossary is a list of words and their defimHons to assist you in using this book
  • Java Card Runtime Environment (JCRE) 2 1 contains the Java Card Virtual Machme (VM), the Java Card Application Programming Interface (API) classes (and industry-specific extensions), and support services
  • the Java Virtual Machine runs as an operating system process
  • the Java applications and their objects are automatically destroyed
  • VM Virtual Machme
  • Persistent memory technology such as EEPROM
  • EEPROM Electrically erasable programmable read-only memory
  • Java Card Virtual Machine is just like the Java Virtual Machine
  • the card initializanon time is the hme after maskmg, and p ⁇ or to the tune of card personalization and issuance
  • the JCRE is initialized
  • the framework objects created by the JCRE exist for the lifetime of the Virtual Machine Because the execution lifetime of the Virtual Machme and the JCRE framework span CAD sessions of the card, the lifetimes of objects created by applets will also span CAD sessions (CAD means Card Acceptance Device, or card reader Card sessions are those pe ⁇ ods when the card is inserted in the CAD, powered up, and exchanging streams of APDUs with the CAD The card session ends when the card is removed from the CAD ) Objects that have this property are called persistent objects
  • the JCRE implementer shall make an object persistent when
  • the Applet register method is called The JCRE stores a reference to the instance of the applet object The JCRE implementer shall ensure that instances of class applet are persistent
  • a Java Card applet's lifetime beg s at the point that it has been correctly loaded into card memory, linked, and otherwise prepared for execution.
  • applet refers to an applet written for the Java Card platform
  • the JCRE interacts with the applet via the applet's public methods install, select, deselect, and process .
  • An applet shall implement the static install method If the install method is not implemented, the applet's objects cannot be created or initialized
  • a JCRE implementation shall call an applet's install, select, deselect, and process methods as desc ⁇ bed below
  • the static install method is called once by the JCRE for each applet instance created.
  • the JCRE shall not call the applet's constructor directly
  • the main task of the install method within the applet is to create an instance of the Applet class, and to register the instance All other objects that the applet will need dunng its lifetime can be created as is feasible Any other preparations necessary for the applet to be selected and accessed by a CAD also can be done as is feasible
  • the install method obtains initialization parameters from the contents of the incommg byte array parameter
  • an applet creates va ⁇ ous objects, initializes them with predefined values, sets some internal state variables, and calls the Applet . register method to specify the AID (applet -Dentifier as defined m ISO 7816-5) to be used to select it. This installation is considered successful when the call to the Applet . register method completes without an exception The installation is deemed unsuccessful if the install method does not call the Applet . register method, or if an exception is thrown from within the install method p ⁇ or to the Applet . register method being called, or if the Applet , register method throws an exception. If the installation is unsuccessful, the JCRE shall perform all cleanup when it regains control. That is, all persistent objects shall be returned to the state they had prior to calling the install method If the installation is successful, the JCRE can mark the applet as available for selection
  • Applets remain in a suspended state until they are explicitly selected Selection occurs when the JCRE receives a SELECT APDU in which the name data matches the AID of the applet. Selection causes an applet to become the currently selected applet
  • the JCRE Prior to calling SELECT, the JCRE shall deselect the previously selected applet The JCRE indicates this to the applet by invoking the applet's deselect method
  • the JCRE informs the applet of selection by invoking its select method
  • the applet may decline to be selected by returning alse from the call to the select method or by throwing an exception If the applet returns rue, the actual SELECT APDU command is supplied to the applet m the subsequent call to its process method, so that the applet can examine the APDU contents.
  • the applet can process the SELECT APDU command exactly like it processes any other APDU command. It can respond to the SELECT APDU with data (see the process method for details), or it can flag errors by throwing an isOException with the approp ⁇ ate SW (returned status word)
  • the SW and optional response data are returned to the CAD
  • selectmgApplet method shall return true when called dunng the select method
  • the Applet . selectmgApplet method will continue to return true durmg the subsequent process method, which is called to process the SELECT APDU command.
  • the JCRE will return an APDU response status word of
  • All APDUs are received by the JCRE, which passes an mstance of the APDU class to the process method of the currently selected applet
  • a SELECT APDU might cause a change m the currently selected applet p ⁇ or to the call to the process method
  • the JCRE automatically appends 0x9000 as the completion response SW to any data already sent by the applet
  • the applet may throw an isOException with an approp ⁇ ate SW, in which case the JCRE catches the exception and returns the SW to the CAD
  • the JCRE When the JCRE receives a SELECT APDU command in which the name matches the AID of an applet, the JCRE calls the DESELECT method of the currently selected applet This allows the applet to perform any cleanup operations that may be required in order to allow some other applet to execute.
  • the Applet . selectmgApplet method shall return false when called dunng the deselect method Exceptions thrown by the deselect method are caught by the JCRE, but the applet is deselected.
  • Power loss occurs when the card is withdrawn from the CAD or if there is some other mechanical or elect ⁇ cal failure.
  • the JCRE shall ensure that.
  • the JCRE implements default applet selection (see paragraph 5 1 ), the default applet is selected as the currently selected applet, and that the default applet's select method is called. Otherwise, the JCRE sets its state to indicate that no applet is selected.
  • Applets sometimes require objects that contam temporary (transient) data that need not be persistent across CAD sessions Java Card does not support the Java keyword transient
  • Java Card technology provides methods to create transient arrays with pnmitive components or references to object
  • transient object is a misnomer It can be incorrectly interpreted to mean that the object itself is transient However, only the contents of the fields of the object (except for the length field) have a transient nature As with any other object in the Java programming language, transient objects within the Java Card platform exist as long as they are referenced from
  • a transient object within the Java Card platform has the following required behavior
  • transient objects shall never be stored in a "persistent memory technology " Using current smart card technology as an example, the contents of transient objects can be stored in RAM, but never in EEPROM The purpose of this requirement is to allow transient objects to be used to store session keys
  • transient objects can be stored m RAM, while the contents of non-transient objects can be stored in EEPROM Typically, RAM technology has a much faster w ⁇ te cycle time than EEPROM )
  • Persistent objects are used for mamtammg states that shall be preserved across card resets
  • a transient object When a transient object is created, one of two events are specified that cause its fields to be cleared
  • CLEAR_ON_RESET transient objects are used for mamtammg states that shall be preserved across applet selections, but not across card resets.
  • CLEAR_ON_DESELECT transient objects are used for mamtammg states that must be preserved while an applet is selected, but not across applet selections or card resets.
  • CLEAR_ON_DESELECT the object's fields are cleared whenever any applet is deselected. Because a card reset implicitly deselects the currently selected applet, the fields of CLEAR_ON_DESELECT objects are also cleared by the same events specified for CLEAR_ON_RESET.
  • the currently selected applet is explicitly deselected (its deselect method is called) only when a SELECT command is processed.
  • the currently selected applet is deselected and then the fields of all CLEAR_ON_DESELECT transient objects are cleared regardless of whether the SELECT command
  • Cards receive requests for service from the CAD in the form of APDUs
  • the SELECT APDU is used by the JCRE to designate a currently selected applet Once selected, an applet receives all subsequent APDUs until the applet becomes deselected
  • applets become selected only via a successful SELECT command
  • some smart card CAD applications require that there be a default applet that is implicitly selected after every card reset The behavior is
  • the JCRE After card reset (or power on, which is a form of reset) the JCRE performs its initializations and checks to see if its internal state indicates that a particular applet is the default applet If so, the JCRE makes this applet the currently selected applet, and the applet's select method is called If the applet's select method throws an exception or returns false, then the JCRE sets its state to indicate that no applet is selected (The applet's process method is not called dunng default applet selection because there is no SELECT APDU ) When a default applet is selected at card reset, it shall not require its process method to be called
  • the JCRE ensures that the ATR has been sent and the card is now ready to accept APDU commands
  • the mechanism for specifying a default applet is not defined in the Java Card API 2 1 It is a JCRE implementation detail and is left to the individual JCRE implementers
  • the SELECT APDU command is used to select an applet Its behavior is
  • the JCRE searches its mtemal table for a matchmg AID
  • the JCRE shall support selectmg an applet where the full AID is present in the SELECT command.
  • JCRE implementers are free to enhance their JCRE to support other selection cnte ⁇ on
  • An example of this is selection via partial AID match as specified in ISO 7816-4
  • the specific requirements are as follows
  • the JCRE prepares to select the new applet If there is an currently selected applet, it is deselected via a call to its deselect method A context switch mto the deselected applet's context occurs at this pomt The JCRE context is restored upon exit from deselect
  • the JCRE sets the new currently selected applet The new applet is selected via a call to its select method, and a context switch mto the new applet's context occurs a If the applet's select method throws an exception or returns lse, then JCRE state is set so that no applet is selected The JCRE responds to the SELECT command with status code 0x6999 (SW_APPLET_SELECT_FAILED) b The new currently selected applet's process method is then called with the SELECT APDU as an input parameter A context switch mto the applet's context occurs
  • the SELECT command is forwarded to the currently selected applet (if any) for processing as a normal applet APDU command
  • the JCRE always enters the state where ao applet is selected
  • the JCRE still goes through the process of deselecting the applet and then selecting it Reselection could fail, leaving the card in a state where no applet is selected
  • the JCRE shall respond to the APDU with status code 0x6999 (SW_APPLET_SELECT_FAILED)
  • the JCRE invokes the process method of the currently selected applet passing the APDU as a parameter This causes a context switch from the JCRE context mto the currently selected applet's context When the process method exits, the VM switches back to the JCRE context The JCRE sends a response APDU and waits for the next command APDU
  • any implementation of the JCRE shall support isolation of contexts and applets. Isolation means that one applet can not access the fields or objects of an applet in another context unless the other applet explicitly provides an interface for access.
  • the JCRE mechanisms for applet isolation and object sharing are detailed in the sections below
  • Java Card firewall within Java Card technology is runtime-enforced protection and is separate from the Java technology protections.
  • the Java language protections still apply to Java Card applets.
  • the Java language ensures that strong typing and protection attributes are enforced
  • Applet firewalls are always enforced in the Java Card VM They allow the VM to automatically perform additional secu ⁇ ty checks at runtime.
  • Firewalls essentially partition the Java Card platform's object system into separate protected object spaces called contexts.
  • the firewall is the boundary between one context and another.
  • the JCRE shall allocate and manage an applet context for each applet that is installed on the card. (But see paragraph 6.1.1.2 below for a discussion of group contexts.)
  • the JCRE maintains its own JCRE context. This context is much like an applet context, but it has special system p ⁇ vi privileges so that it can perform operations that are denied to applet contexts
  • the VM When certain well-defined conditions are met during the execution of lnvoke-type bytecodes as described in paragraph 6.2.8, the VM performs a context switch.
  • the previous context is pushed on an internal VM stack, a new context becomes the currently active context, and the invoked method executes in this new context Upon exit from that method the VM performs a restoring context switch.
  • the o ⁇ ginal context (of the caller of the method) is popped from the stack and is restored as the currently active context.
  • Context switches can be nested. The maximum depth depends on the amount of VM stack space available. Java TM Card TM Runtime Environment (JCRE) 2 1 Specification
  • each instance of a Java Card applet defines a separate context But with Java Card 2 1 technology, the concept of group context is introduced If more than one applet is contained in a smgle Java package, they share the same context Additionally, all instances of the same applet class share the same context In other words, there is no firewall between two applet instances m a group context
  • an object can only be accessed by its owning context, that is, when the owning context is the currently active context
  • the firewall prevents an object from being accessed by another applet m a different context
  • each hme an object is accessed, the object's owner context is compared to the currently active context If these do not match, the access is not performed and a Secu ⁇ tyException is thrown
  • An object is accessed when one of the following bytecodes is executed using the object's reference getfield, putfield, invokevirtual , invokeinterface, athro , ⁇ T>aload, ⁇ T>astore, arraylength, checkcast, instanceof ⁇ T> refers to the va ⁇ ous types of array bytecodes, such as baload, sastore, etc
  • Java Card firewall provides protection against the most frequently anticipated secunty concern developer mistakes and design oversights that might allow sensitive data to be "leaked" to another applet
  • An applet may be able to obtain an object reference from a publicly accessible location, but if the object is owned by a different applet, the firewall ensures security Java TM Card TM Runtime Environment (JCRE) 2 1 Specification
  • the firewall also provides protection against incorrect code If incorrect code is loaded onto a card, the firewall still protects objects from being accessed by this code
  • Java Card API 2 1 specifies the basic minimum protection requirements of contexts and firewalls because these features shall be supported m ways that are not transparent to the applet developer Developers shall be aware of the behavior of objects, APIs, and exceptions related to the firewall
  • JCRE implementers are free to implement additional secu ⁇ ty mechanisms beyond those of the applet firewall, as long as these mechanisms are transparent to applets and do not change the externally visible operation of the VM
  • classes are not owned by contexts There is no runtime context check that can be performed when a class static field is accessed Neither is there a context switch when a static method is invoked (Similarly, mvokespecial causes no context switch )
  • Objects referenced m static fields are just regular objects They are owned by whomever created them and standard firewall access rules apply If it is necessary to share them across multiple applet contexts, then these objects need to be Shareable Interface Objects (SIOs) (See paragraph 6 24 below )
  • the JCRE may perform optional runtime checks that are redundant with the constraints enforced by a verifier
  • a Java Card VM may detect when code violates fundamental language restrictions, such as invoking a pnvate method m another class, and report or otherwise address the violation
  • Secure computer systems shall have a way for non-p ⁇ vilegcd user processes (that are restncted to a subset of resources) to request system services performed by p ⁇ vileged "system" routines
  • the firewall protects these objects from access by applets
  • the entry point designation allows the methods of these objects to be invoked from any context When that occurs, a context switch to the JCRE context is performed
  • These methods are the gateways through which applets request pnvileged JCRE system services
  • JCRE Entry Point Objects Like all JCRE Entry Point Objects, methods of temporary JCRE Entry Point Objects can be invoked from any applet context. However, references to these objects cannot be stored m class variables, mstance variables or array components The JCRE detects and rest ⁇ cts attempts to store references to these ob j ects as part of the firewall functionality to prevent unauthorized re-use
  • the APDU object and all JCRE owned exception objects are examples of temporary JCRE Entry Point Objects
  • JCRE owned AID instances are examples of permanent JCRE Entry Point Objects
  • the JCRE is responsible for
  • JCRE Only the JCRE itself can designate Entry Point Objects and whether they are temporary or permanent. JCRE implemented are responsible for implementing the mechanism by which JCRE Entry Point Objects are designated and how they become temporary or permanent
  • Java Card VM allows an object to be designated as global
  • the JCRE detects and restricts attempts to store references to these objects as part of the firewall functionality to prevent unauthonzed re-use
  • the API specifies that the APDU buffer is cleared to zeroes whenever an applet is selected, before the JCRE accepts a new APDU command This is to prevent an applet's potentially sensitive data from being "leaked" to another applet via the global APDU buffer
  • the APDU buffer can be accessed from a shared interface object context and is suitable for passing data across applet contexts
  • the applet is responsible for protecting secret data that may be accessed from the APDU buffer
  • the JCRE context has a special p ⁇ vilege It can invoke a method of any object on the card For example, assume that object X is owned by applet A Normally, only context A can access the fields and methods of X But the JCRE context is allowed to invoke any of the methods of X Dunng such an invocation, a context switch occurs from the JCRE context to the applet context that owns X
  • the JCRE can access both methods and fields of X Method access is the mechanism by which the JCRE enters an applet context Although the JCRE could invoke any method through the firewall, it shall only invoke the select, process, deselect, and getShareablelnterfaceOb ⁇ ect (see 6 2 7 1) methods defined in the Applet class
  • the JCRE context is the currently active context when the VM begins running after a card reset
  • the JCRE context is the "root" context and is always either the currently active context or the bottom context saved on the stack
  • Shareable interfaces are a new feature in the Java Card API 2 1 to enable applet interaction
  • a shareable interface defines a set of shared interface methods These interface methods can be mvoked from one applet context even if the object implementing them is owned by another applet context
  • SIO Shareable Interface Object
  • the SIO is a normal object whose fields and methods can be accessed
  • the SIO is an mstance of the shareable interface, and only the methods defined in the shareable interface are accessible All other fields and methods of the SIO are protected by the firewall
  • Shareable interfaces provide a secure mechanism for inter-applet communication, as follows
  • applet A first defines a shareable interface, SI A shareable interface extends the interface 3 avacard . framework .
  • SI shareable interface
  • the methods defined in the shareable interface, SI represent the services that applet A makes accessible to other applets
  • Applet A then defines a class C that implements the shareable interface SI C implements the methods defined m SI C may also define other methods and fields, but these are protected by the applet firewall Only the methods defined in SI are accessible to other applets Java TM Card TM Runtime Environment (JCRE) 2 1 Specification
  • Applet A creates an object instance O of class C O belongs to applet A, and the firewall allows A to access any of the fields and methods of O
  • applet B creates an object reference SIO of type SI
  • Applet B invokes a special method (JCSystera getAppletShareablelnterf aceOb 3 ect, desc ⁇ bed in paragraph 6 2 7 2) to request a shared interface object reference from applet A
  • Applet A receives the request and the AID of the requester (B) via
  • Applet getshareablelnterf aceOb 3 ect, and determines whether or not it will share object O with applet B
  • applet A If applet A agrees to share with applet B, A responds to the request with a reference to O This reference is cast to type Shareable so that none of the fields or methods of O are visible
  • Applet B receives the object reference from applet A, casts it to type SI, and stores it m object reference SIO Even though SIO actually refers to A's object O, SIO is of type SI Only the shareable interface methods defined in SI are visible to B The firewall prevents the other fields and methods of O from being accessed by B
  • Applet B can request service from applet A by invoking one of the shareable interface methods of SIO Dunng the invocation the Java Card VM performs a context switch
  • the o ⁇ gtnal currently active context (B) is saved on a stack and the context of the owner (A) of the actual object (O) becomes the new currently active context
  • SI method shareable interface method
  • the SI method can find out the AID of its client (B) via the JCSystem getPreviousContextAID method This is desc ⁇ bed in paragraph 6 2 5 The method determines whether or not it will perform the service for applet B
  • the firewall allows the SI method to access all the fields and methods of object O and any other object owned by A At the same time, the firewall prevents the method from accessing non-shared objects owned by B
  • the SI method can access the parameters passed by B and can provide a return value to B
  • the firewall agam allows B to access any of its objects and prevents B from accessmg non-shared objects owned by A
  • the JCRE shall return the mstance AID of the applet mstance active at the time of the last context switch
  • the JCRE context does not have an AID If an applet calls the getPreviousContextAID method when the applet context was entered directly from the JCRE context, this method returns null
  • the applet calls getPreviousContextAID from a method that may be accessed either from within the applet itself or when accessed via a shareable interface from an external applet, it shall check for null return before performing caller AID authentication Java TM Card TM Runtime Environment (JCRE) 2 1 Specification
  • a shareable interface is simply one that extends (either directly or indirectly) the tagging interface j avacard framework Shareable
  • This Shareable interface is similar m concept to the Remote interface used by the RMI facility, in which calls to the interface methods take place across a local/remote boundary
  • Interfaces extending the Shareable tagging interface have this special property calls to the interface methods take place across Java Card's applet firewall boundary via a context switch
  • the Shareable interface serves to identify all shared objects Any object that needs to be shared through the applet firewall shall directly or indirectly implement this interface Only those methods specified in a shareable interface are available through the firewall
  • Implementation classes can implement any number of shareable interfaces and can extend other shareable implementation classes
  • a shareable interface simply defines a set of service methods
  • a service provider class declares that it "implements" the shareable interface and provides implementations for each of the service methods of the interface
  • a service client class accesses the services by obtaining an object reference, casting it to the shareable interface type if necessary, and invoking the service methods of the interface
  • the shareable interfaces within the Java Card technology shall have the following properties
  • Inter-applet communication is accomplished when a client applet invokes a shareable interface method of a SIO belongmg to a server applet
  • a client applet invokes a shareable interface method of a SIO belongmg to a server applet
  • the JCRE provides a mechanism to make this possible
  • the Applet class and the JCSystem class provide methods to enable a client to request services from the server
  • This method is implemented by the server applet instance It shall be called by the JCRE to mediate between a client applet that requests to use an object belonging to another applet, and the server applet that makes its objects available for sharing
  • the default behavior shall return null, which indicates that an applet does not participate m inter-applet communication
  • a server applet that is intended to be invoked from another applet needs to override this method This method should examme the clientAiD and the parameter If the clientAiD is not one of the expected AIDs, the method should return null Similarly, if the parameter is not recognized or if it is not allowed for the Java TM Card TM Runtime Envirorment (JCRE) 2 1 Specification
  • the method also should return null Otherwise, the applet should return an SIO of the shareable interface type that the client has requested
  • the server applet need not respond with the same SIO to all clients
  • the server can support multiple types of shared interfaces fcr different purposes and use clientAiD and parameter to determine which -and of SIO to return to the client
  • the JCSystem class contains the method getAppletShareablelnterf aceOb 3 ect, which is mvoked by a client applet to communicate with a server applet
  • the JCRE shall implement this method to behave as follows
  • the JCRE searches its internal applet table for one with serverAlD If not found, null is returned.
  • a context switch occurs to the server applet, and its implementation of etshareablelnterf ace ⁇ b 3 ect proceeds as described in the previous section
  • the server applet returns a SIO (or null)
  • the implementation shall make it impossible for the client to tell which of the following conditions caused a null value to be returned
  • a static class field is accessed when one of the following Java bytecodes is executed getstatic, putstatic
  • An object is accessed when one of the following Java bytecodes is executed using the object's reference getfield, putfield, mvokevirtual , mvokeinterf ace , athrow, ⁇ T>aload, ⁇ T>astore, array-length, checkcast , instanceof
  • ⁇ T> refers to the vanous types of array bytecodes, such as baload, sastore, etc
  • the Java Card VM Prior to performing the work of the bytecode as specified by the Java VM, the Java Card VM will perform an access check on the referenced object If access is denied, then a secur tyException is thrown
  • Java Card VM The access checks performed by the Java Card VM depend on the type and owner of the referenced object, the bytecode, and the currently active context They are described in the following sections Java TM Card TM Runtime Environment (JCRE) 2.1 Specification
  • Context is switched to the object owner's context.
  • Transient objects of CLEAR_ON_RESET type behave like persistent objects in that they can be accessed only when the currently active applet context is the same as the owner of the object (the currently active applet context at the time when the object was created)
  • Transient objects of CLEAR_ON_DESELECT type can only be created or accessed when the currently active applet context is the currently selected applet context If any of the akeTransient factory methods is called to create a CLEAR_ON_DESELECT type transient object when the currently active applet context is not the currently selected applet context, the method shall throw a System-Exception with reason code of ILLEGAL_TRANSIENT If an attempt is made to access a transient object of CLEAR_ON_DESELECT type when the currently active applet context is not the currently selected applet context, the JCRE shall throw a Security-Exception
  • Applets that are part of the same package share the same group context Every applet mstance from a package shares all its object mstances with all other mstances from the same package (This mcludes transient objects of both CLEAR_ON_RESET type and CLEAR_ON_DESELECT type owned by these applet instance )
  • transient objects of CLEAR_ON_DESELECT type owned by any applet mstance within the same package shall be accessible when any of the applet mstances m this package is the currently selected applet
  • a transaction is a logical set of updates of persistent data. For example, transferring some amount of money from one account to another is a banking transaction. It is important for transactions to be atomic: either all of the data fields are updated, or none are.
  • the JCRE provides robust support for atomic transactions, so that card data is restored to its onginal pre-transaction state if the transaction does not complete normally. This mechanism protects agamst events such as power loss in the middle of a transaction, and agamst program errors that might cause data corruption should all steps of a transaction not complete normally.
  • Atomicity defines how the card handles the contents of persistent storage after a stop, failure, or fatal exception dunng an update of a single object or class field or array component. If power is lost dunng the update, the applet developer shall be able to rely on what the field or array component contains when power is restored.
  • the Java Card platform guarantees that any update to a smgle persistent object or class field will be atomic.
  • the Java Card platform provides single component level atomicity for persistent arrays. That is, if the smart card loses power dunng the update of a data element (field in an object class or component of an array) that shall be preserved across CAD sessions, that data element will be restored to its previous value.
  • Some methods also guarantee atomicity for block updates of multiple data elements. For example, the atomicity of the Util . arrayCopy method guarantees that either all bytes are correctly copied or else the destination array is restored to its previous byte values
  • An applet might need to atomically update several different fields or array components in several different objects. Either all updates take place correctly and consistently, or else all fields components are restored to their previous values.
  • the Java Card platform supports a transactional model in which an applet can designate the beginning of an atomic set of updates with a call to the JCSystem . begmTransaction method. Each object update after this 47/1
  • Transaction duration is the life of a transaction between the call to JCSystem. beginTransact ion, and either a call to commitTransaction or an abortion of the transaction
  • the JCSystem transactionDepth method is provided to allow you to determine if a transaction is m progress
  • This action is performed automatically by the JCRE when it reinitializes the card after recovering from the power loss, reset, or failure
  • the JCRE determines which of those objects (if any) were conditionally updated, and restores them
  • the JCRE automatically aborts the transaction If a return from any of select, deselect , process or install methods occurs with a transaction in progress, the JCRE acts as if an exception was thrown
  • Object instances created dunng the transaction that is being aborted can be deleted only if all references to these objects can be located and converted into null .
  • the JCRE shall ensure that references to objects created dunng the aborted transaction are equivalent to a null reference
  • the Java Card technology provides methods to determine how much commit capacity is available on the implementation
  • the commit capacity represents an upper bound on the number of conditional byte updates available
  • the actual number of conditional byte updates available may be lower due to management overhead.
  • the topics m this chapter complement the requirements specified in the Java Card 2 1 API Draft 2 Specification
  • the first topic is the Java Card I/O functionality, which is implemented entirely in the APDU class
  • the second topic is the API supporting Java Card security and cryptography
  • the JCSystem class encapsulates the API version level
  • the implementation of the API classes shall not initiate or otherwise alter the state of a transaction if one is in progress
  • the implementation shall support the invocation of API instance methods, even when the owner of the object mstance is not the currently selected applet In other words, unless specifically called out, the implementation shall not use resources such as transient objects of CLEAR_ON_DESELECT type
  • the APDU class encapsulates access to the ISO 7816-4 based I O across the card senal lme
  • the APDU Class is designed to be independent of the underlying I O transport protocol
  • the APDU Class allows mode selection via the setOutgoingNoChaimng method 47/4
  • ⁇ INS> the protocol byte equal to the mcommg header INS byte, which mdicates that all data bytes will be transferred next
  • ⁇ INS> the protocol byte that is the complement of the mcommg header INS byte, which mdicates about 1 data byte being transferred next
  • the card sends ⁇ SW1,SW2> completion status on completion of the Applet process method
  • the waitExtension method may be mvoked by the applet between successive calls to sendBytes or sendBytesLong methods
  • the waitExtension method shall request an additional work waiting time (ISO 7 16-3) using the 0x60 procedure byte
  • the sendBytes or the sendBytesLong methods shall throw an APDUException with reason code NO_T0_GETRESPONSE
  • the transport proto' ol sequence shall not use block chaming Specifically, the M-bit (more data bit) shall not be set in the PCB of the I-blocks dunng the transfers (ISO 7816-3) In other words, the entire outgomg data (Lr bytes) shall be transferred in one I-block
  • the waitExtension method may be mvoked by the applet between successive calls to sendBytes or sendBytesLong methods
  • the getlnstance method m the following classes return an implementation mstance in the context of the calling applet of the requested algo ⁇ thm
  • An implementation of the JCRE may implement 0 or more of the algonthms listed m the API When an algo ⁇ thm that is not implemented is requested this method shall throw a CryptoException with reason code NO_SUCH_ALGORITHM
  • Implementations of the above classes shall extend the corresponding base class and implement all the abstract methods All data allocation associated with the implementation mstance shall be performed at the tune of mstance construction to ensure that any lack of required resources can be flagged early dunng the mstallation of the applet
  • the buildKey method of the 3 avacard security keyBuilder class returns an implementation mstance of the requested Key type
  • the JCRE may implement 0 or more types of keys
  • the method shall throw a CryptoException with reason code
  • Implementations of key types shall implement the associated mterface All data allocation associated with the key implementation instance shall be performed at the time of instance construction to ensure that any lack of required resources can be flagged early during the installation of the applet
  • the getversion method shall return (short) 0x0201
  • a lack of resources condition (such as heap space) which is recoverable shall result in a SystemException with reason code NO_RESOURCE
  • the factory methods in JCSystera used to create transient arrays throw a SystemException with reason code NO_TRANSIENT_SPACE to indicate lack of transient space
  • Java Card API 2 1 is intended to give JCRE implementers as much freedom as possible in their implementations
  • some basic common specifications are required m order to allow Java Card applets to be installed without knowing the implementation details of a particular installer
  • the Applet Installer is an optional part of the JCRE 2 1 Specification That is, an implementation of the JCRE does not necessarily need to include a post-issuance Installer However, if implemented, the mstaller is requ-red to support the behavior specified in section 9 1
  • the mechanisms necessary to install an applet on smart cards usmg Java Card technology are embodied in an on-card component called the Installer
  • the Installer appears to be an applet It has an AID, and it becomes the currently selected applet when this AID is successfully processed by a SELECT command Once selected, the Installer behaves m much the same way as any other applet
  • the Installer need not be implemented as an applet on the card The requirement is only that the Installer functionality be SELECTable The corollary to this requirement is that Installer component shall not be able to be invoked when a non-Installer applet is selected nor when no applet is selected 47/10
  • JCRE implementer could choose to implement the Installer as an applet If so, then the Installer might be coded to extend the Applet class and respond to invocations of the select, process, and deselect methods
  • JCRE implementer could also implement the Installer in other ways, as long as it provides the SELECTable behavior to the outside world In this case, the JCRE implementer has the freedom to provide some other mechanism by which APDUs are delivered to the Installer code module
  • the Installer is SELECTable, it shall have an AID JCRE implementers are free to choose their own AID by which their Installer is selected Multiple installers may be implemented
  • the Java Card API 2 1 does not specify any APDUs for the Installer JCRE unplementers are entirely free to choose their own APDU commands to direct their Installer in its work
  • the model is that the Installer on the card is dnven by an mstallation program runnmg on the CAD In order for installation to succeed, this CAD mstallation program shall be able to
  • the Java Card API 2 1 does not specify the details of the CAD mstallation program nor the APDUs passed between it and the installer
  • JCRE implementers shall also define other behaviors of their Installer, including
  • the JCRE shall guarantee that an applet will not be deemed successfully installed if
  • an Installer may be implemented as an applet, an Installer will typically require access to features that are not available to "other applets For example, depending on the JCRE implementer's implementation, the Installer will need to
  • each JCRE implementer determines the Installer implementation and supply such features in their JCRE implementations as necessary to support their Installer JCRE implementers are also responsible for the security of such features, so that they are not available to normal applets
  • the Installer shall invoke the applet's install method This method is defined in the Applet class
  • the maximum size of the parameter data is 32 bytes And for secu ⁇ ty reasons, the bArray parameter is zeroed after the return (just as the APDU buffer is zeroed on return from an applet's process method )
  • the Java Card API 2 1 does not specify anything about the contents of the mstallation parameter byte array segment This is fully defined by the applet designer and can be in any format desired.
  • these installation parameters are intended to be opaque to the Installer
  • JCRE implementers should design their Installers so that it is possible for an installation program running in a CAD to specify an arbitrary byte array to be delivered to the Installer The Installer simply forwards this byte array to the target applet's install method in the bArray parameter
  • a typical implementation might define a JCRE lmplementer-prop ⁇ etary APDU command that has the semantics "call the applet's install method passing the contents of the accompanying byte array " 47/12
  • AID is an acronym for Application IDentifier as defined in ISO 7816-5.
  • APDU is an acronym for Application Protocol Data Unit as defined in ISO 7816-4.
  • API is an acronym for Application Programming Interface.
  • the API defines calling conventions by which an application program accesses the operating system and other services.
  • Java Card Applet within the context of this document means a Java Card Applet, which is the basic unit of selection, context, functionality, and security in Java Card technology.
  • Applet developer refers to a person creating a Java Card applet using the Java Card technology specifications.
  • Applet firewall is the mechanism in the Java Card technology by which the VM prevents an applet from making unauthorized accesses to objects owned by other applet contexts or the JCRE context, and reports or otherwise addresses the violation.
  • Atomic operation is an operation that either completes in its entirety (if the operation succeeds) or no part of the operation completes at all (if the operation fails).
  • Atomicity refers to whether a particular operation is atomic or not and is necessary for proper data recovery in cases in which power is lost or the card is unexpectedly removed from the CAD.
  • ATR is an acronym for Answer to Reset.
  • An ATR is a string of bytes sent by the Java Card after a reset condition.
  • CAD Card Acceptance Device.
  • the CAD is the device in which the card is inserted.
  • Cast is the explicit conversion from one data type to another.
  • c CK is the test suite to verify the compliance of the implementation of the Java Card Technology specifications.
  • the cJCK uses the JavaTest tool to run the test suite.
  • Class is the prototype for an object in an object-oriented language.
  • a class may also be considered a set of objects that share a common structure and behavior.
  • the structure of a class is determined by the class variables that represent the state of an object of that class and the behavior is given by a set of methods associated with the class.
  • Classes are related in a class hierarchy.
  • One class may be a specialization (a subclass) of another (its superclass), it may have reference to other classes, and it may use other classes in a client-server relationship.
  • the JCRE keeps track of the currently active Java Card applet context.
  • a virtual method is invoked on an object, and a context switch is required and permitted, the currently active 47/16
  • the JCRE keeps track of the currently selected Java Card applet Upon receiving a SELECT command with this applet's AID, the JCRE makes this applet the currently selected applet The JCRE sends all APDU commands to the currently selected applet
  • EEPROM is an acronym for Electncally Erasable, Programmable Read Only Memory
  • Framework is the set of classes that implement the API This mcludes core and extension packages Responsibilities mclude dispatchmg of APDUs, applet selection, managing atomicity, and installing applets
  • Garbage collection is the process by which dynamically allocated storage is automatically reclaimed dunng the execution of a program
  • Instance variables also known as fields, represent a portion of an object's internal state
  • Each object has its own set of mstance variables Objects of the same class will have the same mstance va ⁇ ables, but each object can have different values
  • Instantiation, m object-oriented programming means to produce a particular object from its class template This involves allocation of a data structure with the types specified by the template, and initialization of instance variables with either default values or those provided by the class's constructor function
  • JAR is an acronym for Java Archive JAR is a platform-independent file format that combines many files into one
  • Java Card Runtime Environment consists of the Java Card Virtual Machme, the framework, and the associated native methods
  • JC21RI is an acronym for the Java Card 2 1 Reference Implementation
  • JCRE implementer refers to a person creating a vendor-specific implementation usmg the Java Card API
  • JCVM is an acronym for the Java Card Virtual Machme
  • the JCVM is the foundation of the OP card architecture
  • the JCVM executes byte code and manages classes and objects It enforces separation between applications (firewalls) and enables secure data shanng
  • JDK is an acronym for Java Development Kit
  • the JDK is a Sun Microsystems, Inc product that provides the environment required for programming in Java
  • the JDK is available for a vanety of platforms, but most notably Sun Solans and Microsoft Windows ®
  • Method is the name given to a procedure or routine, associated with one or more classes, m object-oriented languages
  • Namespace is a set of names which all names are unique
  • Object-Oriented is a programming methodology based on the concept of an object, which is a data structure encapsulated with a set of routines, called methods, which operate on the data
  • Objects, in object-o ⁇ ented programming are unique mstances of a data structure defined according to the template provided by its class Each object has its own values for the variables belonging to its class and can respond to the messages (methods) defined by its class 47/17
  • Package is a namespace within the Java programming language and can have classes and interfaces
  • a package is the smallest unit within the Java programming language
  • Shareable interface Defines a set of shared interface methods These mterface methods can be mvoked from one applet context when the object implementing them is owned by another applet context
  • SIO Shareable interface object
  • Transaction is an atomic operation in which the developer defines the extent of the operation by indicatmg in the program code the beginning and end of the transaction
  • Transient object The values of transient objects do not persist from one CAD session to the next, and are reset to a default state at specified intervals Updates to the values of transient objects are not atomic and are not affected by transactions
  • JCRE21-DF2-14DEC98.zip contains a second draft of the Java Card 2.1 Runtime Environment specification, dated December 14, 1998, for Licensee review and comment. We have worked incorporate and clarify the document based upon the review feedback we've received to date.
  • Java Card Runtime Environment 2.1 Specification specifies the minimum behavior and runtime environment for complete Java Card 2.1 implementation, as referred to by the Java Card APT 2.1 and Java Card 2.1 Virtual Machine Specification documents. This specification is required to ensure compatible operation of Java Card applets. The purpose of this specification document is to bring all the JCRE elements together in a concise manner as part of the Java Card 2.1 specification suite.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A small footprint device, such as a smart card, can securely run multiple programs from unrelated vendors by the inclusion of a context barrier isolating the execution of the programs. The context barrier performs security checks to see that principal and object are within the same namespace or memory space or to see that a requested action is authorized for an object to be operated upon.

Description

TECHNIQUES FOR IMPLEMENTING SECURITY ON A SMALL FOOTPRINT DEVICE USING A CONTEXT BARRIER
BACKGROUND OF THE INVENTION
Field of the Invention
The invention relates to computer security and more particularly to techniques for implementing a security on small footprint devices, such as smart cards.
Description of Related Art A number of object oriented programming languages are well known in the art.
Examples of these include the C++ language and the Smalltalk language.
Another such object oriented language is the JAVA™ language. This language is described in the book Java™ Language Specification, by James Gosling et al. and published by Addison- Wesley. This work is incorporated herein by reference in its entirety. The JAVA™ language is particularly well suited to run on a Java™ Virtual
Machine. Such a machine is described in the book Java™ Virtual Machine Specification, by Tim Lindholm and Frank Yellin which is also published by Addison- Wesley and which is also incorporated herein by reference in its entirety.
A number of small footprint devices are also well known in the art. These include smart cards, cellular telephones, and various other small or miniature devices.
Smart cards are similar in size and shape to a credit card but contain, typically, data processing capabilities within the card (e.g. a processor or logic performing processing functions) and a set of contacts through which programs, data and other communications with the smart card may be achieved. Typically, the set of contacts includes a power source connection and a return as well as a clock input, a reset input and a data port through which data communications can be achieved.
Information can be written to a smart card and retrieved from a smart card using a card acceptance device. A card acceptance device is typically a peripheral attached to a host computer and contains a card port, such as a slot, in to which a smart card can be inserted. Once inserted, contacts or brushes from a connector press against the surface connection area on the smart card to provide power and to permit communications with the processor and memory typically found on a smart card.
Smart cards and card acceptance devices (CADs) are the subject of extensive standardization efforts, e.g. ISO 7816. The use of firewalls to separate authorized from unauthorized users is well known in the network environment. For example, such a firewall is disclosed in U.S. Patent Application Serial No. 09/203,719, filed December 1, 1998 and entitled "AUTHENTICATED FIREWALL TUNNELLING FRAMEWORK" in the name of inventor David Brownell (Docket No. 50435-023/P2789/TJC), which application is incorporated herein by reference in its entirety.
A subset of the full Java™ platform capabilities has been defined for small footprint devices, such as smart cards. This subset is called the Java Card™ platform. The uses of the Java Card™ platform are described in the following publications.
JAVA CARD™ 2.0 - LANGUAGE SUBSET AND VIRTUAL MACHINE SPECIFICATION;
JAVA CARD™ 2.1 - APPLICATION PROGRAMMING INTERFACES;
JAVA CARD™ 2.0 - PROGRAMMING CONCEPTS;
JAVA CARD™ APPLET DEVELOPERS GUIDE.
These publications are incorporated herein by reference in their entirety. A working draft of ISO 7816 — Part 11 has been circulated for comment. That draft specifies standards for permitting separate execution contexts to operate on a smart card. A copy of that working draft is hereby incorporated by reference in its entirety.
The notion of an execution context is well known in computer science. Generally speaking, the use of multiple execution contexts in a computing environment provides a way to separate or isolate different program modules or processes from one another, so that each can operate without undue interference from the others. Interactions —if any— between different contexts are deliberate rather than accidental, and are carefully controlled so as to preserve the integrity of each context. An example of multiple contexts is seen in larger hardware devices, such as mainframes, where a plurality of virtual machines may be defined, each such virtual machine having its own execution context. Another example is seen in U.S. Patent No. 5,802,519 in the name of inventor De Jong, which describes the use of multiple execution contexts on a smart card. It will be appreciated by those of skill in the art that a computing environment which provides multiple execution contexts also needs to provide a mechanism for associating any given executing code with its corresponding context. Also well known is the notion of a current context. Certain computing environments that support multiple contexts will, at any given time, treat one context in particular as an active focus of computation. The context can be referred to as the "current context." When the current context changes, so that some other context becomes the current context, a "context switch" is said to occur. As will be appreciated by those of skill in the art, these computing environments provide mechanisms for keeping track of which context is the current one and for facilitating context switching.
In the prior art, in the world of small footprint devices, and particularly in the world of smart cards, there was no inter-operation between contexts operating on the small footprint devices. Each context operated totally separately and could operate or malfunction within its context space without affecting other applications or processes in a different context.
One layer of security protection utilized by the Java™ platform is commonly referred to as a sandbox model. Untrusted code is placed into a "sandbox" where it can "play" safely without doing any damage to the "real world" or full Java™ environment. In such an environment, Java™ applets don't communicate, but each has its own name space.
Some smart card operating systems don't permit execution contexts to communicate directly, but do permit communications through an operating system, or through a server.
The Problems
A number of problems exist when trying to place computer programs and other information on a small footprint device. One of the compelling problems is the existence of very limited memory space. This requires often extraordinary efforts to provide needed functionality within the memory space. A second problem associated with small footprint devices is the fact that different small footprint device manufacturers can utilize different operating systems. As a result, applications developed for one operating system are not necessarily portable to small footprint devices manufactured by a different manufacturer.
If programs from more than one source of programs (manufacturer or vendor) are to be applied to a single small footprint device, security becomes a factor as one attempts to avoid corruption of existing programs and data when a new program is loaded on to the small footprint device. The same concern exists when one wishes to prevent a hacker or a malicious person from accessing programs and data.
It is clear that small footprint devices such as smart cards don't have the resources necessary to implement separate virtual machines. Nevertheless, it is desirable to maintain strict security between separate execution contexts.
In the past, security was provided by loading only applications from the same source or from a known trusted source onto a smart card or other small footprint device.
Accordingly, it would be desirable to allow object-oriented interaction between selected execution contexts only in safe ways via fast efficient peer to peer communications which do not impose undue burdens on the programmer but facilitate dynamic loading of applets written at different times by untrusted sources.
SUMMARY OF THE INVENTION The invention is directed to providing a context barrier (sometimes referred to as a firewall) for providing separation and isolation of one context from another and to provide controlled access across the barrier when that is needed.
In accordance with the invention, two execution contexts, e.g. each containing one or more applets, running in the same logical (i.e., virtual or real) machine, protected from each other, can share information in a controlled, secure way, using language mechanisms, such as object-oriented language mechanisms. Security can be, for example, object by object. Thus, a method in a first execution context can access a first object A in a second execution context, but not a second object B in the second execution context on a selective basis.
In accordance with one exemplary embodiment, an enhanced Java™ Virtual Machine (VM) provides certain run-time checks of attempted access across execution contexts in the VM. Checks can be automatic by the VM or coded by the programmer with support from the VM. This can be done using language-level communication mechanisms. In this way, one can express object access across execution contexts in the same way as other object accesses using the language are made. These run-time checks provide a second dimension of defense/security beyond that which the Java™ language and platform already provide. These mechanisms provide protection against, e.g., security holes due to programming bugs (such as declaring a datum "public" (global) when it shouldn't be accessible to all contexts). They also allow fine-grain control of sharing (such as selection of objects to share and applets to share to).
The invention is also directed to computer program products and carrier waves related to the other aspects of the invention.
The foregoing and other features, aspects and advantages of the present invention will become more apparent from the following detailed description of the present invention when taken in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS The features and advantages of the present invention will be apparent from the following description in which:
Figure 1 is an illustration of a computer equipped with a card acceptance device and of a smart card for use with the card acceptance device.
Figure 2 is an illustration of a computer equipped with a card acceptance device connected to a network.
Figure 3 is an exemplary hardware architecture of a small footprint device, such as a smart card, of the prior art.
Figure 4 illustrates objects being accessed by principals as done in the prior art.
Figure 5 is an exemplary security model which can be used in explaining the various embodiments of the invention.
Figure 6 is a block diagram showing separation of execution contexts by a firewall or context barrier in accordance with one aspect of the invention.
Figure 7 is a representation of a software architecture useful in carrying out the invention. Figure 8 is a flow chart of a security enforcement process implementing a firewall in accordance with one aspect of the invention. Figure 9 is a block diagram showing object access across a firewall in accordance with one aspect of the invention.
Figure 10 is a block diagram showing cascaded object access across a firewall.
Figure 11 is a flow chart of a process for permitting access by a principal in one context across a firewall into another context.
Figure 12 is a block diagram illustrating the use of an entry point object to permit access across a firewall.
Figure 13 is a block diagram illustrating the use of a global data structure such as an array for access across a firewall. Figure 14 is a block diagram illustrating the use of a supercontext to permit access across a firewall.
Figure 15 is a block diagram illustrating the use of shareable interface objects to permit access across a firewall.
Figure 16 is a flow chart of a security enforcement process permitting access across a firewall.
Figure 17 is the flow chart of Figure 16 showing details of block 1620.
Figure 18 is a flow chart showing an exemplary implementation of block 1629 of Figure 17.
NOTATIONS AND NOMENCLATURE The detailed descriptions which follow may be presented in terms of program procedures executed on a computer or network of computers. These procedural descriptions and representations are the means used by those skilled in the art to most effectively convey the substance of their work to others skilled in the art.
A procedure is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. These steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It proves convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be noted, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
Further, the manipulations performed are often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations described herein which form part of the present invention; the operations are machine operations. Useful machines for performing the operation of the present invention include general purpose digital computers or other computational devices. The present invention also relates to apparatus for performing these operations.
This apparatus may be specially constructed for the required purpose or it may comprise a general purpose computer as selectively activated or reconfigured by a computer program stored in the computer. The procedures presented herein are not inherently related to a particular computer or other apparatus. Various general purpose machines may be used with programs written in accordance with the teachings herein, or it may prove more convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these machines will appear from the description given.
DETAILED DESCRIPTION Attached as an Appendix to this specification is an unpublished draft of a document entitled JAVA CARD RUNTIME ENVIRONMENT 2.1 SPECIFICATION. This draft document, which provides further detailed description of specific embodiments of the invention, is incorporated in its entirety as an integral part of the present specification. Although the inventive techniques are described hereinafter in the context of a smart card example, the example is merely illustrative and shouldn't limit the scope of the invention.
Figure 1 is an illustration of a computer 120 equipped with a card acceptance device 110 and a smart card 100 for use with the card acceptance device 110. In operation, the smart card 100 is inserted into card acceptance device 110 and power and data connections applied through a set of contacts 105 accessible at the surface of the smart card 100. When the card is inserted, mating contacts from the card acceptance device 110 interconnect with the surface contacts 105 to power-up the card and permit communications with the onboard processor and memory storage.
Figure 2 is an illustration of a computer equipped with a card acceptance device, such as 120 in Figure 1, connected to a network 200. Also connected to a network are a plurality of other computing devices, such as server 210. It is possible to load data and software onto a smart card over the network 200 using card equipped device 120. Downloads of this nature can include applets or other programs to be loaded onto a smart card as well as digital cash and other information used in accordance with a variety of electronic commerce and other applications. The instructions and data used to control processing elements of the card acceptance device and of the smart card may be stored in volatile or non-volatile memory or may be received directly over a communications link, e.g., as a carrier wave containing the instructions and/or data. Further, for example, the network can be a LAN or a WAN such as the Internet or other network.
Figure 3 is an exemplary hardware architecture of a small footprint device, such as a smart card, of the prior art. As shown in Figure 3, a processor 300 interconnects with primary storage 310 which may include read only memory 315 and/or random access memory 316. The processor also connects with a secondary storage 320 such as EEPROM and with an input/output 330, such as a serial port. One can see the small footprint devices of this nature can be very simple.
Figure 4 illustrates objects being accessed by principals as done in the prior art. As shown in Figure 4, physical device 400, such as the small footprint device may have contained within it one or more processing machines (virtual or physical) which are running an execution context 420. The execution context may be, for example, a context associated with a particular applet. One or more principals 430 (e.g., applets or applications) in the execution context may seek to access other objects within the execution context. As long as the access occurs within the execution context, the accesses will be permitted and everything will function normally. Figure 5 is an exemplary security model which can be used in explaining the various embodiments of the invention. It is just one of many models which might be utilized but is a convenient model for this purpose. In this model, a principal (sometimes called entity) 500 proposes to take an action 510 on an object, such as object 520. Security checks may be imposed on the principal, on the object, and/or on the action proposed to be taken. In Figure 5, two types of objects are shown on which action may be taken by a principal. These include data objects, (e.g. datal and data2 (520, 520')) and entity 530. A principal may operate or attempt to operate on any of these objects.
While data is passive, an entity 530 is active. The diagram line from Principal to an active entity is also labeled "action," but this could be a more sophisticated and arbitrarily complex action, such as making a function or method call or sending a message as compared with action on a data object. As with data, a security check enforced by the operating system may use the identity of the principal, the identity of the entity, and/or the type of action. Furthermore, the entity, being active, can perform its own additional security checks. These can be as arbitrarily complex as one desires, and can make use of the identity of the Principal, the identity of the entity itself, the action, and/or any other information that is available.
In an object-oriented system (such as the Java Card™ platform) "objects" are typically a combination of data and entity. When a Principal tries to access a field of an object, this is a data access—a fairly simple action protected by a fairly simple security check. When a Principal tries to access a method of an object, this is an entity access, which can be arbitrarily complex both in action and in security check.
Figure 6 is a block diagram showing separation of execution contexts by a firewall or context barrier in accordance with one aspect of the invention. The physical device 400 and the machine 410 correspond to the same items shown in Figure 4. An execution context 420 shows one principal 430 attempting to access object 440 within the context. This access would normally succeed. However, execution context 420 also shows a principal 630 attempting to access object 640 of execution context 620, across a context barrier 600. Normally, this access would be prohibited as indicated by the X 636 where the action 635 crosses the context barrier 600. Figure 7 is a representation of a software architecture useful in carrying out the invention. This software architecture is shown as a run time environment 700. An operating system 710 for the small footprint device is commonly used. A virtual machine 720, in an exemplary embodiment of the invention, is implemented over the operating system. The virtual machine could be a Java Card™ virtual machine or other virtual machine. The capabilities of a standard virtual machine can be expanded to provide the additional functionality described herein or the functionality can be provided as separate modules. The virtual machine 720 may include an interpreter or native implementation 730 which provides access to a run time system 740. The run time system includes object system 750 for managing the objects of an object oriented implementation. Three contexts, 760, 770 and 780, are shown. Each context is separated from the other by a context barrier (sometimes referred to as a firewall) between the execution contexts. Context 760 is, in one specific embodiment, a supercontext. That is, context 760 has privileges and capabilities not available to subordinate contexts 770 and 780, potentially including privileges to create entry point objects or global data structures, and to access objects in subordinate contexts 770 and 780.
Every object is associated with one particular context. That context is said to own each object that is associated with it. The runtime system 740 provides a means for uniquely identifying contexts, and a means for specifying and identifying the currently executing context. The object system 750 provides a mechanism for associating objects with their owning contexts.
For example, the runtime 740 can identify contexts with a unique name, and correspondingly the object system 750 can associate objects with that context by recording the context's name in the object's header. Information in the object's header cannot be accessed by programs written in the object-oriented language, but is only available to the virtual machine 720 itself. Alternately, the runtime system 740 can identify contexts by dividing the memory space into separate regions, each for a particular context, and correspondingly the object system 750 can associate objects with that context by allocating the object's storage in that context's memory space.
Figure 8 is a flow chart of a security enforcement process implementing a context barrier in accordance with one aspect of the invention. When a principal invokes an action on an object (800) a check is made to determine whether the object is within the context of the principal (810). If it is not, the action is disallowed (840). Otherwise, the action is permitted (830). This is the simplest form of context barrier or firewall. In one specific embodiment the action is disallowed (840) by throwing a security exception if the object is outside of the namespace or the memory space of the context requesting access.
Figure 9 is a block diagram showing object access across a firewall in accordance with one aspect of the invention. Figure 9 is substantially similar to Figure 6. However, Figure 9 also shows principal 900 seeking to access object 910 in order to perform action 905 on the object 910. According to the invention, rather than having the access blocked by the firewall 600, in the way that action 635 is blocked, action 905 is permitted to occur across the firewall through access point 920 so that principal 900 can perform action 905 on object 910 notwithstanding the fact that the principal and the object are in different execution contexts. The mechanisms behind access point 920 are described below with reference to Figures 12-18. Note that access point 920 can coexist with obstructed accesses such as X 636. Thus access point 920 provides fine- grain control of sharing (object by object security) across context barrier 600.
When object access 900 is initiated, the current context setting is context 420. If the object 910 is a data object, the action 905 is a simple data access, and no code is executed in the second context 620. If the object 910 is an entity object, and the action 905 results in that object's code being executed, that code is executed in the second context 620. To execute the code of object 910 in the correct context 620, the virtual machine 410 performs a context switch. The context switch changes the current context setting to be context 620, and the previous value of the current context setting is stored so that it can be restored later. From that point on code will execute in the new current context. When the action 905 completes, control is returned to the point following access 900. During the return, the virtual machine 410 must restore the value of the current context setting to its previous value.
Figure 10 is a block diagram showing cascaded object accesses across a firewall. Figure 10 shows three execution contexts, 1000, 1010 and 1020. Principal 1030 in execution context 1 seeks to invoke an action 1035 on object 1050 in execution context 2 and does so through access point 1070 in context barrier 600. Object 1050 in execution context 2 has an object access 1040 which seeks to perform an action 1045 on the object 1060 in execution context 3. It achieves this by using access point 1080 in context barrier 600' separating execution contexts 2 and 3. Object 1050 in execution context 2 also has another object access 1090 which invokes an action 1095 on an object 1099 in the same execution context, that is, in execution context 2. Both actions 1035 and 1045 result in context switches as described in the explanation of Figure 9. But as action 1095 does not cross the context barrier, a context switch is not required for its execution, and therefore does not occur.
Figure 11 is a flow chart of a process for permitting access by a principal in one context across a firewall into another context. There are essentially three steps to this process. In execution context 2, an object to be accessed is created and designated as shared (1100). In execution context 1, the principal obtains a reference to the object in execution context 2 (1110). The principal in execution context 1 then invokes an action upon the object designated as shared in context 2 (1120). With respect to identifying or designating a created object as shareable as discussed in item 1100 of Figure 11, this can be done, in accordance with a specific embodiment of the invention, by including a shareable attribute in the header of an object's representation. Information in an object's header cannot be accessed by programs written in the object-oriented language, but is only available to the VM itself. Obtaining a reference to an object in another context is a special case of accessing an object in another context. A mechanism that provides access to an object in another context can make other objects available also. For instance, invoking a method on an object in another context may return a reference to a second object in a different context. An additional mechanism is required to allow an initial reference to an object in a different context to be obtained. In a specific embodiment, references to certain well-known entry point objects can be obtained using a public API. Once the initial reference to an object in a different context is obtained, further references can be obtained from that object, and so on.
There are four general approaches to obtaining information across a context barrier in accordance with the invention. These approaches can be utilized individually or in combination in order to access an object across a context barrier or to obtain a reference of an object to be accessed across a context barrier (1110). These approaches are described in Figures 12-18.
Figure 12 is a block diagram illustrating the use of entry point objects to permit access across a context barrier. As shown in Figure 12, some object 1200 in context 770 (context 1) desires access to information in supercontext 760. In the specific embodiment, a supercontext 760 contains at least one entry point object 1210. The entry point object 1210 can be published as part of a public API, or can be made available indirectly through a published API (e.g., in accordance with the mechanisms described previously with reference to Figure 11), so that each context subordinate to the supercontext may communicate with the entry point object of the supercontext. (It will be appreciated that in other embodiments, entry point objects may be housed by a context other than the supercontext.)
Figure 13 is a block diagram illustrating the use of global data structures to permit access across a firewall. In this approach, supercontext 760 creates a global data structure such as a global array. In the specific embodiment supercontext 760 is the only context permitted to create such a global data structure. (It will be appreciated that in other embodiments, global data may be housed by a context other than the supercontext.) By virtue of its global status, each of the contexts 770 and 780 may read and write to the global data structure. Thus, information written into the global data structure by one context can be read by another context. For example, this mechanism can be used to pass binary data or references to objects between contexts.
Figure 14 is a block diagram illustrating the use of supercontext privileges to permit access across a context barrier. In Figure 14, an object in supercontext 760 seeks access to context 780 across the context barrier separating the two. Supercontext 760 can invoke any of the methods of context 780 and can access any of the data contained within context 780, by virtue of the privileges associated with the supercontext.
Figure 15 is a block diagram illustrating the use of shareable interface objects to permit access across a firewall. A shareable interface defines a set of shareable interface methods. A shareable interface object is an object that implements at least the set of methods defined in a shareable interface. In Figure 15, object 1210 in context 2 (780) is a shareable interface object. An object access 1200 in another context 770 can invoke any of the shareable interface methods on the object 1210 if the principal of the object access 1200 is authorized to do so by the object 1210 itself. This authorization is further discussed with reference to Figure 18 below.
It will be appreciated that a virtual machine consistent with the invention provides functionality beyond that of earlier virtual machines, such as the virtual machine described in the Java™ Virtual Machine Specification. In particular, consistently with the invention, the virtual machine provides functionality to implement or to facilitate a security enforcement process that permits access across a firewall. This process is described next with reference to Figures 16-18. Note that it is applicable to any approach for providing access across the firewall, including but not limited to the four approaches described with reference to Figures 12-15 above.
Figure 16 is a flow chart of a security enforcement process permitting access across a firewall. When a principal attempts to invoke action on an object 1600, a check is made to determine if the object is within the context of the principal (1610). If it is, (1610-Y), the action is permitted (1630). If it is not, (1610-N), a check is made to see if the action by the principal is permitted on the object (1620). If it is, (1620-Y), the action is permitted (1630). If it is not, (1620-N), the action is disallowed. In the specific embodiment a security exception is thrown (1640).
Figure 17 is the flow chart of Figure 16 showing further details of block 1620. If the object is not within the context of the principal (1610-N), a plurality of tests, 1621,
1622, 1623... 1629 are undertaken to see if the action by the principal is permitted on the object. These tests can be done by the virtual machine alone or by the virtual machine plus the object, in a virtual machine object oriented implementation. If any of the tests results in a pass, the action is permitted (1630). However, if all tests result in a negative determination (162X~No), the action will be disallowed. In a specific embodiment, a security exception will be thrown (1640). These tests relate to the permitted access discussed in conjunction with Figures 12-15.
Figure 18 is a flow chart showing an exemplary implementation of block 1629 of Figure 17 for use with access method described in Figure 15. In a test, such as 829 or 1629, a virtual machine checks if the object is a shared object 1810. If it is not (1810-
No), the test will fail. However, if it is (1810-Yes), the virtual machine will invoke the method A on object O (1820). If the method A on object O determines that the principal is authorized (1830), the test will be passed (1840) and access permitted. Otherwise, the test will fail (1850). This allows the authorization text to be programmed into the code of the object itself. Although the invention has been illustrated with respect to a smart card implementation, the invention applies to other devices with a small footprint, not just to smart cards. Devices with a small footprint are generally considered to be those that are restricted or limited in memory or in computing power or speed. Such small footprint devices may include boundary scan devices, field programmable devices, pagers and cellular phones among many others.
In general, small footprint devices are resource constrained computational devices and systems where secure interoperation of execution contexts is a concern. Such small devices impose constraints on the implementation of security measures because of their limited resources. Because of resource constraints, in a virtual machine implementation, a single virtual or physical machine must be used as opposed to multiple virtual machines.
The invention may also be applied to devices with larger footprints where the characteristics of the invention may prove beneficial. For example, the invention may prove advantageous when using servlets if there is object sharing between them. Even some desktop systems may profitably utilize the techniques of the invention.
While the Java™ language and platform are suitable for the invention, any language or platform having certain characteristics would be well suited for implementing the invention. These characteristics include type safety, pointer safety, object-oriented, dynamically linked, and virtual-machine based. Not all of these characteristics need to be present in a particular implementation. In some embodiments, languages or platforms lacking one or more of these characteristics may be utilized. A "virtual machine" could be implemented either in bits (virtual machine) or in silicon (real/physical machines).
Although the invention has been illustrated showing object by object security, other approaches, such as class by class security could be utilized. Although the present invention has been described and illustrated in detail, it is clearly understood that the same is by way of illustration and example only and is not to be taken by way of limitation, the spirit and scope of the present invention being limited only by the terms of the appended claims and their equivalents.
Java ™ Card ™ Runtime Environment (JCRE) 2.1 Specification
Draft 2
Copyright © 1998 Sun Microsystems, Inc
901 San Antonio Road, Palo Alto, CA 94303 USA
All rights reserved Copyright in this document is owned by Sun Microsystems, Inc
Sun Microsystems, Inc (SUN) hereby grants to you at no charge a nonexclusive, nontransferable, worldwide, limited license (without the right to subhcense) under SUN's intellectual property rights that are essential to practice the Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification ("Specification") to use the Specification for internal evaluation purposes only Other than this limited license, you acquire no πght, title, or interest in or to the Specification and you shall have no right to use the Specification for productive or commercial use
RESTRICTED RIGHTS LEGEND
Use, duplication, or disclosure by the U S Government is subject to restrictions of FAR 52 227-14(g)(2)(6/87) and FAR 52 227- 19(6/87), or DFAR 252 227-7015(b)(6/95) and DFAR 2277202-l(a)
SUN MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY OF THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT SUN SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES
TRADEMARKS
Sun, the Sun logo, Sun Microsystems, JavaSoft, JavaBeans, JDK, Java, Java Card, Hoϋava, HoUava Views, Visual Java, Solans, NEO, Joe, Netra, NFS, ONC, ONC+, Open Windows, PC-NFS, EmbeddedJava, PersonalJava, SNM, SunNet Manager, Solans sunburst design, Solstice, SunCore, SolarNet, Sun Web, Sun Workstation, The Network Is The Computer, ToolTalk, Ultra, Ultracomputing, Ultraserver, Where The Network Is Going, Sun Workshop, XView, Java Workshop, the Java Coffee Cup logo, and Visual Java are trademarks or registered trademarks of Sun Microsystems, Inc in the United States and other countries
THIS PUBLICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT
THIS PUBLICATION COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN, THESE CHANGES WILL BE INCORPORATED IN NEW EDITIONS OF THE PUBLICATION SUN MICROSYSTEMS, INC MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED IN THIS PUBLICATION AT ANY TIME
Java ™ Card ™ Runtime Environment (JCRE) 2.1 Specification
Contents
Preface vi
1. Introduction 1-1
2. Lifetime of the Java Card Virtual Machine 2-1
3. Java Card Applet Lifetime 3-1
3.1 The Method install 3-1
3.2 The Method select 3-2
3.3 The Method process 3-2
3.4 The Method deselect 3-3
3.5 Power Loss and Reset 3-3
4. Transient Objects 4-1
4.1 Events That Clear Transient Objects 4-2
5. Selection-. 5-1
5.1 The Default Applet 5-1
5.2 SELECT Command Processing 5-2
5.3 Non-SELECT Command Processing 5-3
6. Applet Isolation and Object Sharing 6-1
6.1 Applet Firewall 6-1
6.1.1 Contexts and Context Switching 6- 1 Java ™ Card ™ Runtime Environment (JCRE) 2.1 Specification
6.1.2 Object Ownership 6-2
6.1.3 Object Access 6-2
6.1.4 Firewall Protection 6-2
6.1.5 Static Fields and Methods 6-3
6.2 Object Access Across Contexts 6-3
6.2.1 JCRE Entry Point Objects 6-4
6.2.2 Global Arrays 6-4
6.2.3 JCRE Privileges 6-5
6.2.4 Shareable Interfaces 6-5
6.2.5 Determining the Previous Context 6-6
6.2.6 Shareable Interface Details 6-7
6.2.7 Obtaining Shareable Interface Objects 6-7
6.2.8 Object Access Behavior 6-8
6.3 Transient Objects and Applet contexts 6-12
7. Transactions and Atomicity 7-1
7.1 Atomicity 7-1
7.2 Transactions 7-1
7.3 Transaction Duration 7-2
7.4 Nested Transactions 7-2
7.5 Tear or Reset Transaction Failure 7-2
7.6 Aborting a Transaction 7-3
7.6.1 Programmatic Abortion 7-3
7.6.2 Abortion by the JCRE 7-3
7.6.3 Cleanup Responsibilities of the JCRE 7-3
7.7 Transient Objects 7-3
7.8 Commit Capacity 7-3
8. API Topics 8-1
8.1 The APDU Class 8-1
8.1.1 T=0 specifics for outgoing data transfers 8-1 Java ™ Card ™ Runtime Environment (JCRE) 2.1 Specification
8.1.2 T=l specifics for outgoing data transfers 8-3
8.2 The secuπty and crypto packages 8-4
8.3 JCSystem Class 8-5
9. Virtual Machine Topics 9-1
9.1 Resource Failures 9-1
10. Applet Installer 10-1
10.1 The Installer 10-1
10.1.1 Installer implementation 10-1
10.1.2 Installer AID 10-2
10.1.3 Installer APDUs 10-2
10.1.4 Installer Behavior 10-2
10.1.5 Installer Privileges 10-3
10.2 The Newly Installed Applet 10-3
10.2.1 Installation Parameters 10-3
11. API Constants 1
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
Preface
Java™ Card™ technology combines a portion of the Java programming language with a runtime environment optimized for smart cards and related, small-memory embedded devices The goal of Java Card technology is to bnng many of the benefits of Java software programming to the resource-constrained world of smart cards
This document is a specification of the Java Card Runtime Environment (JCRE) 2 1 A vendor of a Java Card- enabled device provides an implementation of the JCRE A JCRE implementation within the context of this specification refers to a vendor's implementation of the Java Card Virtual Machine (VM), the Java Card Application Programming Interface (API), or other component, based on the Java Card technology specifications A Reference Implementation is an unplementadon produced by Sun Microsystems, Inc Applets wntten for the Java Card platform are referred to as Java Card applets
Who Should Use This Specification?
This specification is mtended to assist JCRE implementers in creating an implementation, developing a specification to extend the Java Card technology specifications, or in creating an extension to the Java Card Runtime Environment (JCRE) This specification is also mtended for Java Card applet developers who want a greater understanding of the Java Card technology specifications
Before You Read This Specification
Before reading this guide, you should be familiar with the Java programming language, the Java Card technology specifications, and smart card technology A good resource for becoming familiar with Java technology and Java Card technology is the Sun Microsystems, Inc website, located at http / / ava. sun. com.
How This Specification Is Organized
Chapter 1, "The Scope and Responsibilities of the JCRE," gives an overview of the services required of a JCRE implementation
Chapter 2, "Lifetime of the Virtual Machine," defines the lifetime of the Virtual Machine Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
Chapter 3, "Applet Lifetime," defines the lifetime of an applet
Chapter 4, "Trasient Objects," provides an overview of transient objects
Chapter 5, "Selection," descnbes how the JCRE handles applet selection
Chapter 6, "Applet Isolation and Object Sharing," describes applet isolation and object sharing
Chapter 7, "Transactions and Atomicity," provides an overview of atomicity during transactions
Chapter 8, "API Topics," descπbes API functionality required of a JCRE but not completely specified in the Java Card 21 API Specification
Chapter 9, "Virtual Machine Topics," descnbes virtual machine specifics
Chapter 10, "Applet Installer," provides an overview of the Applet Installer
Chapter 11, "API Constants," provides the numeπc value of constants that are not specified in the Java Card API 2 I Specification
Glossary is a list of words and their defimHons to assist you in using this book
Related Documents and Publications
References to vanous documents or products are made in this manual You should have the following documents available
■ Java Card 2 1 API Draft 2 Specification, Sun Microsystems, Inc
■ Java Card 20 Language Subset and Virtual Machine Specificatton, October 13, 1997, Revision 1 0 Final, Sun Microsystems, Inc
■ Java Card Applet Developer s Guide, Sun Microsystems, Inc
■ The Java Language Specification by James Gosling, Bill Joy, and Guy L Steele Addison- Wesley, 1996, ISBN 0-201-63451-1
■ The Java Virtual Machine Specification (Java Series) by Tim Lindholm and Frank Yellin Addison- Wesley, 1996, ISBN 0-201 -63452-X
■ The Java Class Libraries An Annotated Reference (Java Series) by Patπck Chan and Rosanna Lee Addison-Wesley, two volumes, ISBN 0201310023 and 0201310031
■ ISO 7816 Specification Parts 1-6
■ EMV '96 Integrated Circuit Card Specification for Payment Systems
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
1. Introduction
The Java Card Runtime Environment (JCRE) 2 1 contains the Java Card Virtual Machme (VM), the Java Card Application Programming Interface (API) classes (and industry-specific extensions), and support services
This document, the JCRE 2 1 Specification, specifies the JCRE functionality required by the Java Card technology Any implementation of Java Card technology shall provide this necessary behavior and environment
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
2. Lifetime of the Java Card Virtual Machme
In a PC or workstation, the Java Virtual Machine runs as an operating system process When the OS process is terminated, the Java applications and their objects are automatically destroyed
In Java Card technology the execution lifetime of the Virtual Machme (VM) is the lifetime of the card Most of the information stored on a card shall be preserved even when power is removed from the card Persistent memory technology (such as EEPROM) enables a smart card to store information when power is removed Since the VM and the objects created on the card are used to represent application information that is persistent, the Java Card VM appears to run forever When power is removed, the VM stops only te poranly When the card is next reset, the VM starts up again and recovers its previous object heap from persistent storage
Aside from its persistent nature, the Java Card Virtual Machine is just like the Java Virtual Machine
The card initializanon time is the hme after maskmg, and pπor to the tune of card personalization and issuance At the time of card initialization, the JCRE is initialized The framework objects created by the JCRE exist for the lifetime of the Virtual Machine Because the execution lifetime of the Virtual Machme and the JCRE framework span CAD sessions of the card, the lifetimes of objects created by applets will also span CAD sessions (CAD means Card Acceptance Device, or card reader Card sessions are those peπods when the card is inserted in the CAD, powered up, and exchanging streams of APDUs with the CAD The card session ends when the card is removed from the CAD ) Objects that have this property are called persistent objects
The JCRE implementer shall make an object persistent when
• The Applet register method is called The JCRE stores a reference to the instance of the applet object The JCRE implementer shall ensure that instances of class applet are persistent
• A reference to an object is stored m a field of any other persistent object or in a class's static field This requirement stems from the need to preserve the integrity of the JCRE's internal data structures
Java ™ Card ™ R-ntime Environment (JCRE) 2 1 Specification
3. Java Card Applet Lifetime
For the purposes of this specification, a Java Card applet's lifetime beg s at the point that it has been correctly loaded into card memory, linked, and otherwise prepared for execution. (For the remamder of this specification, applet refers to an applet written for the Java Card platform ) Applets registered with the Applet . register method exist for the lifetime of the card The JCRE interacts with the applet via the applet's public methods install, select, deselect, and process . An applet shall implement the static install method If the install method is not implemented, the applet's objects cannot be created or initialized A JCRE implementation shall call an applet's install, select, deselect, and process methods as descπbed below
When the applet is installed on the smart card, the static install method is called once by the JCRE for each applet instance created. The JCRE shall not call the applet's constructor directly
3.1 The Method install
When install is called, no objects of the applet exist The main task of the install method within the applet is to create an instance of the Applet class, and to register the instance All other objects that the applet will need dunng its lifetime can be created as is feasible Any other preparations necessary for the applet to be selected and accessed by a CAD also can be done as is feasible The install method obtains initialization parameters from the contents of the incommg byte array parameter
Typically, an applet creates vaπous objects, initializes them with predefined values, sets some internal state variables, and calls the Applet . register method to specify the AID (applet -Dentifier as defined m ISO 7816-5) to be used to select it. This installation is considered successful when the call to the Applet . register method completes without an exception The installation is deemed unsuccessful if the install method does not call the Applet . register method, or if an exception is thrown from within the install method pπor to the Applet . register method being called, or if the Applet , register method throws an exception. If the installation is unsuccessful, the JCRE shall perform all cleanup when it regains control. That is, all persistent objects shall be returned to the state they had prior to calling the install method If the installation is successful, the JCRE can mark the applet as available for selection
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
3.2 The Method select
Applets remain in a suspended state until they are explicitly selected Selection occurs when the JCRE receives a SELECT APDU in which the name data matches the AID of the applet. Selection causes an applet to become the currently selected applet
Prior to calling SELECT, the JCRE shall deselect the previously selected applet The JCRE indicates this to the applet by invoking the applet's deselect method
The JCRE informs the applet of selection by invoking its select method
The applet may decline to be selected by returning alse from the call to the select method or by throwing an exception If the applet returns rue, the actual SELECT APDU command is supplied to the applet m the subsequent call to its process method, so that the applet can examine the APDU contents. The applet can process the SELECT APDU command exactly like it processes any other APDU command. It can respond to the SELECT APDU with data (see the process method for details), or it can flag errors by throwing an isOException with the appropπate SW (returned status word) The SW and optional response data are returned to the CAD
The Applet . selectmgApplet method shall return true when called dunng the select method The Applet . selectmgApplet method will continue to return true durmg the subsequent process method, which is called to process the SELECT APDU command.
If the applet declines to be selected, the JCRE will return an APDU response status word of
ISO . sw_APPLET_SEi-ECT_FAiι-ED to the CAD Upon selection failure, the JCRE state is set to indicate that no applet is selected
After successful selection, all subsequent APDUs are delivered to the currently selected applet via the process method
3.3 The Method process
All APDUs are received by the JCRE, which passes an mstance of the APDU class to the process method of the currently selected applet
Note - A SELECT APDU might cause a change m the currently selected applet pπor to the call to the process method
On normal return, the JCRE automatically appends 0x9000 as the completion response SW to any data already sent by the applet
At any time dunng process, the applet may throw an isOException with an appropπate SW, in which case the JCRE catches the exception and returns the SW to the CAD
If any other exception is thrown durmg process, the JCRE catches the exception and returns the status word
IS07816 . S UNKNOWN to the CAD Java ™ Card ™ Runtime Enviror-nent (JCRE) 2.1 Specification
3.4 The Method deselect
When the JCRE receives a SELECT APDU command in which the name matches the AID of an applet, the JCRE calls the DESELECT method of the currently selected applet This allows the applet to perform any cleanup operations that may be required in order to allow some other applet to execute.
The Applet . selectmgApplet method shall return false when called dunng the deselect method Exceptions thrown by the deselect method are caught by the JCRE, but the applet is deselected.
3.5 Power Loss and Reset
Power loss occurs when the card is withdrawn from the CAD or if there is some other mechanical or electπcal failure. When power is reapp ed to the card and on Card Reset (warm or cold) the JCRE shall ensure that.
• Transient data is reset to the default value.
• The transaction in progress, if any, when power was lost (or reset occurred) is aborted.
• The applet that was selected when power was lost (or reset occurred) becomes implicitly deselected. (In this case the deselect method is not called.)
• If the JCRE implements default applet selection (see paragraph 5 1 ), the default applet is selected as the currently selected applet, and that the default applet's select method is called. Otherwise, the JCRE sets its state to indicate that no applet is selected.
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
4. Transient Objects
Applets sometimes require objects that contam temporary (transient) data that need not be persistent across CAD sessions Java Card does not support the Java keyword transient However, Java Card technology provides methods to create transient arrays with pnmitive components or references to object
The term "transient object" is a misnomer It can be incorrectly interpreted to mean that the object itself is transient However, only the contents of the fields of the object (except for the length field) have a transient nature As with any other object in the Java programming language, transient objects within the Java Card platform exist as long as they are referenced from
• The stack
• Local vaπables
• A class static field
• A field in another existing object
A transient object within the Java Card platform has the following required behavior
• The fields of a transient object shall be cleared to the field's default value (zero, false, or null) at the occurrence of certain events (see below)
• For security reasons, the fields of a transient object shall never be stored in a "persistent memory technology " Using current smart card technology as an example, the contents of transient objects can be stored in RAM, but never in EEPROM The purpose of this requirement is to allow transient objects to be used to store session keys
• Writes to the fields of a transient object shall not have a performance penalty (Using current smart card technology as an example, the contents of transient objects can be stored m RAM, while the contents of non-transient objects can be stored in EEPROM Typically, RAM technology has a much faster wπte cycle time than EEPROM )
• Writes to the fields of a transient object shall not be affected by "transactions " That is, an abortTransaction will never cause a field m a transient object to be restored to a previous value
This behavior make transient objects ideal for small amounts of temporary applet data that is frequently modified, but that need not be preserved across CAD or select sessions
Java ™ Card ™ Runtime £n"ironment (JCRE) 2.1 Specification
4.1 Events That Clear Transient Objects
Persistent objects are used for mamtammg states that shall be preserved across card resets When a transient object is created, one of two events are specified that cause its fields to be cleared CLEAR_ON_RESET transient objects are used for mamtammg states that shall be preserved across applet selections, but not across card resets. CLEAR_ON_DESELECT transient objects are used for mamtammg states that must be preserved while an applet is selected, but not across applet selections or card resets.
Details of the two clear events are as follows
• CLEAR_ON_RESET — the object's fields are cleared when the card is reset. When a card is powered on, this also causes a card reset.
Note - It is not necessary to clear the fields of transient objects before power is removed from a card However, it is necessary to guarantee that the previous contents of such fields cannot be recovered once power is lost.
• CLEAR_ON_DESELECT — the object's fields are cleared whenever any applet is deselected. Because a card reset implicitly deselects the currently selected applet, the fields of CLEAR_ON_DESELECT objects are also cleared by the same events specified for CLEAR_ON_RESET.
The currently selected applet is explicitly deselected (its deselect method is called) only when a SELECT command is processed. The currently selected applet is deselected and then the fields of all CLEAR_ON_DESELECT transient objects are cleared regardless of whether the SELECT command
• Fails to select an applet
• Selects a different applet
• Reselects the same applet
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
5. Selection
Cards receive requests for service from the CAD in the form of APDUs The SELECT APDU is used by the JCRE to designate a currently selected applet Once selected, an applet receives all subsequent APDUs until the applet becomes deselected
There is no currently selected applet when either of the following occurs
• The card is reset and no applet has been pre-designated as the default applet
• A SELECT command fails when attempting to select an applet
5.1 The Default Applet
Normally, applets become selected only via a successful SELECT command However, some smart card CAD applications require that there be a default applet that is implicitly selected after every card reset The behavior is
1 After card reset (or power on, which is a form of reset) the JCRE performs its initializations and checks to see if its internal state indicates that a particular applet is the default applet If so, the JCRE makes this applet the currently selected applet, and the applet's select method is called If the applet's select method throws an exception or returns false, then the JCRE sets its state to indicate that no applet is selected (The applet's process method is not called dunng default applet selection because there is no SELECT APDU ) When a default applet is selected at card reset, it shall not require its process method to be called
2 The JCRE ensures that the ATR has been sent and the card is now ready to accept APDU commands
If a default applet was successfully selected, then APDU commands can be sent directly to this applet If a default applet was not selected, then only SELECT commands can be processed
The mechanism for specifying a default applet is not defined in the Java Card API 2 1 It is a JCRE implementation detail and is left to the individual JCRE implementers
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specif ica 'ion
5.2 SELECT Command Processing
The SELECT APDU command is used to select an applet Its behavior is
1 The SELECT APDU is always processed by the JCRE regardless of which, if any, applet is active
2 The JCRE searches its mtemal table for a matchmg AID The JCRE shall support selectmg an applet where the full AID is present in the SELECT command.
JCRE implementers are free to enhance their JCRE to support other selection cnteπon An example of this is selection via partial AID match as specified in ISO 7816-4 The specific requirements are as follows
Note - An astensk mdicates bmary bit numbeπng as in IS07816 Most sigmficant bit = b8 Least significant bit = bl a) Applet SELECT command uses CLA=OxO0, INS=0xA4 b) Applet SELECT command uses "Selection by DF name" Therefore, PI =0x04 c) Any other value of PI implies that is not an applet select The APDU is processed by the currently selected applet d) JCRE shall support exact DF name (AID) selection l e P2=%b0000 xxOO (b4,b3* are dont care) e) All other partial DF name SELECT options (b2,bl *) are JCRE implementation dependent f) All file control information option codes (b4,b3*) shall be supported by the JCRE and interpreted and processed by the applet
3 If no AID match is found a If there is no currently selected applet, the JCRE responds to the SELECT command with status code 0x6999 (SW_APPLET_SELECT_F AILED) b Otherwise, the SELECT command is forwarded to the currently selected applet's process method A context switch into the applet's context occurs at this point (The applet context is defined in paragraph 6 1 1 ) Applets may use the SELECT APDU command for their own mtemal SELECT processing
4 If a matchmg AID is found, the JCRE prepares to select the new applet If there is an currently selected applet, it is deselected via a call to its deselect method A context switch mto the deselected applet's context occurs at this pomt The JCRE context is restored upon exit from deselect
5 The JCRE sets the new currently selected applet The new applet is selected via a call to its select method, and a context switch mto the new applet's context occurs a If the applet's select method throws an exception or returns lse, then JCRE state is set so that no applet is selected The JCRE responds to the SELECT command with status code 0x6999 (SW_APPLET_SELECT_FAILED) b The new currently selected applet's process method is then called with the SELECT APDU as an input parameter A context switch mto the applet's context occurs
Notes - Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
If there is no matching AID, the SELECT command is forwarded to the currently selected applet (if any) for processing as a normal applet APDU command
If there is a matching AID and the SELECT command fails, the JCRE always enters the state where ao applet is selected
If the matching AID is the same as the currently selected applet, the JCRE still goes through the process of deselecting the applet and then selecting it Reselection could fail, leaving the card in a state where no applet is selected
5.3 Non-SELECT Command Processing
When a non-SELECT APDU is received and there is no currently selected applet, the JCRE shall respond to the APDU with status code 0x6999 (SW_APPLET_SELECT_FAILED)
When a non-SELECT APDU is received and there is a currently selected applet, the JCRE invokes the process method of the currently selected applet passing the APDU as a parameter This causes a context switch from the JCRE context mto the currently selected applet's context When the process method exits, the VM switches back to the JCRE context The JCRE sends a response APDU and waits for the next command APDU
Java ™ Card ™ Runtime Environment (JCRE) 2.1 Specification
6. Applet Isolation and Object Sharing
Any implementation of the JCRE shall support isolation of contexts and applets. Isolation means that one applet can not access the fields or objects of an applet in another context unless the other applet explicitly provides an interface for access. The JCRE mechanisms for applet isolation and object sharing are detailed in the sections below
6.1 Applet Firewall
The applet firewall within Java Card technology is runtime-enforced protection and is separate from the Java technology protections. The Java language protections still apply to Java Card applets The Java language ensures that strong typing and protection attributes are enforced
Applet firewalls are always enforced in the Java Card VM They allow the VM to automatically perform additional secuπty checks at runtime.
6.1.1 Contexts and Context Switching
Firewalls essentially partition the Java Card platform's object system into separate protected object spaces called contexts. The firewall is the boundary between one context and another. The JCRE shall allocate and manage an applet context for each applet that is installed on the card. (But see paragraph 6.1.1.2 below for a discussion of group contexts.)
In addition, the JCRE maintains its own JCRE context. This context is much like an applet context, but it has special system pπvileges so that it can perform operations that are denied to applet contexts
At any point in time, there is only one active context within the VM (This is called the currently active context.) All bytecodes that access objects are checked at runtime against the currently active context in order to determine if the access is allowed. A 3 ava . lang . Security-Exception is thrown when an access is disallowed.
When certain well-defined conditions are met during the execution of lnvoke-type bytecodes as described in paragraph 6.2.8, the VM performs a context switch. The previous context is pushed on an internal VM stack, a new context becomes the currently active context, and the invoked method executes in this new context Upon exit from that method the VM performs a restoring context switch. The oπginal context (of the caller of the method) is popped from the stack and is restored as the currently active context. Context switches can be nested. The maximum depth depends on the amount of VM stack space available. Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
Most method invocations in Java Card technology do not cause a context switch Context switches only occur dunng invocation of and return from certain methods, as well as dunng exception exits from those methods (see 62 8)
Dunng a context-switching method invocation, an additional piece of data, indicating the currently active context, is pushed onto the return stack This context is restored when the method is exited
Further details of contexts and context switching are provided in later sections of this chapter
6 1.1.1 Group Contexts
Usually, each instance of a Java Card applet defines a separate context But with Java Card 2 1 technology, the concept of group context is introduced If more than one applet is contained in a smgle Java package, they share the same context Additionally, all instances of the same applet class share the same context In other words, there is no firewall between two applet instances m a group context
The discussion of contexts and context switching above in section 6 1 1 assumes that each applet mstance is associated with a separate context In Java Card 2 1 technology, contexts are compared to enforce the firewall, and the mstance AID is pushed onto the stack Additionally, this happens not only when the context switches, but also when control switches from an object owned by one applet mstance to an object owned by another mstance within the same package
6.1.2 Obj ect Ownership
When a new object is created, it is associated with the currently active context But the object is owned by the applet mstance within the currently active context when the object is instantiated An object is owned by an applet instance, or by the JCRE
6.1.3 Object Access
In general, an object can only be accessed by its owning context, that is, when the owning context is the currently active context The firewall prevents an object from being accessed by another applet m a different context
In implementation terms, each hme an object is accessed, the object's owner context is compared to the currently active context If these do not match, the access is not performed and a SecuπtyException is thrown
An object is accessed when one of the following bytecodes is executed using the object's reference getfield, putfield, invokevirtual , invokeinterface, athro , <T>aload, <T>astore, arraylength, checkcast, instanceof <T> refers to the vaπous types of array bytecodes, such as baload, sastore, etc
This list mcludes any special or optimized forms of these bytecodes implemented in the Java Card VM, such as getf ιeld_b, sgetf ιeld_s_thιs, etc
6.1.4 Firewall Protection
The Java Card firewall provides protection against the most frequently anticipated secunty concern developer mistakes and design oversights that might allow sensitive data to be "leaked" to another applet An applet may be able to obtain an object reference from a publicly accessible location, but if the object is owned by a different applet, the firewall ensures security Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
The firewall also provides protection against incorrect code If incorrect code is loaded onto a card, the firewall still protects objects from being accessed by this code
The Java Card API 2 1 specifies the basic minimum protection requirements of contexts and firewalls because these features shall be supported m ways that are not transparent to the applet developer Developers shall be aware of the behavior of objects, APIs, and exceptions related to the firewall
JCRE implementers are free to implement additional secuπty mechanisms beyond those of the applet firewall, as long as these mechanisms are transparent to applets and do not change the externally visible operation of the VM
6.1.5 Static Fields and Methods
It should also be noted that classes are not owned by contexts There is no runtime context check that can be performed when a class static field is accessed Neither is there a context switch when a static method is invoked (Similarly, mvokespecial causes no context switch )
Public static fields and public static methods are accessible from any context static methods execute in the same context as their caller
Objects referenced m static fields are just regular objects They are owned by whomever created them and standard firewall access rules apply If it is necessary to share them across multiple applet contexts, then these objects need to be Shareable Interface Objects (SIOs) (See paragraph 6 24 below )
Of course, the conventional Java technology protections are still enforced for static fields and methods In addition, when applets are installed, the Installer verifies that each attempt to lmk to an external static field or method is permitted Installation and specifics about linkage are beyond the scope of this specification
6.1.5.1 Optional static access checks
The JCRE may perform optional runtime checks that are redundant with the constraints enforced by a verifier A Java Card VM may detect when code violates fundamental language restrictions, such as invoking a pnvate method m another class, and report or otherwise address the violation
6.2 Object Access Across Contexts
To enable applets to mteract with each other and with the JCRE, some well-defined yet secure mechanisms are provided so one context can access an object belonging to another context
These mechanisms are provided in the Java Card API 2 1 and are discussed in the following sections
• JCRE Entry Point Objects
• Global Arrays
• JCRE Pπvileges
• Shareable Interfaces Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
6.2.1 JCRE Entry Point Objects
Secure computer systems shall have a way for non-pπvilegcd user processes (that are restncted to a subset of resources) to request system services performed by pπvileged "system" routines
In the Java Card API 2 1, this is accomplished using JCRE Entry Point Objects These are objects owned by the JCRE context, but they have been flagged as containing entry point methods
The firewall protects these objects from access by applets The entry point designation allows the methods of these objects to be invoked from any context When that occurs, a context switch to the JCRE context is performed These methods are the gateways through which applets request pnvileged JCRE system services
There are two categories of JCRE Entry Point Objects
Temporary JCRE Entry Point Objects
Like all JCRE Entry Point Objects, methods of temporary JCRE Entry Point Objects can be invoked from any applet context. However, references to these objects cannot be stored m class variables, mstance variables or array components The JCRE detects and restπcts attempts to store references to these objects as part of the firewall functionality to prevent unauthorized re-use
The APDU object and all JCRE owned exception objects are examples of temporary JCRE Entry Point Objects
Permanent JCRE Entry Point Objects
Like all JCRE Entry Point Objects, methods of permanent JCRE Entry Point Objects can be mvoked from any applet context Additionally, references to these objects can be stored and freely re-used
JCRE owned AID instances are examples of permanent JCRE Entry Point Objects
The JCRE is responsible for
• Determining what pnvileged services are provided to applets
• Defining classes containing the entry point methods for those services
• Creating one or more object instances of those classes
• Designating those instances as JCRE Entry Point Objects
• Designating JCRE Entry Point Objects as temporary or permanent
• Making references to those objects available to applets as needed
Note - Only the methods of these objects are accessible through the firewall The fields of these objects are still protected by the firewall and can only be accessed by the JCRE context
Only the JCRE itself can designate Entry Point Objects and whether they are temporary or permanent. JCRE implemented are responsible for implementing the mechanism by which JCRE Entry Point Objects are designated and how they become temporary or permanent
6.2.2 Global Arrays
The global nature of some objects requires that they be accessible from any applet context The firewall would ordmaπly prevent these objects from being used in a flexible manner The Java Card VM allows an object to be designated as global
All global arrays are temporary global array objects These objects are owned by the JCRE context, but can be accessed from any applet context However, references to these objects cannot be stored in class vaπables, Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
instance variables or array components The JCRE detects and restricts attempts to store references to these objects as part of the firewall functionality to prevent unauthonzed re-use
For added secuπty, only arrays can be designated as global and only the JCRE itself can designate global arrays Because applets cannot create them, no API methods are defined. JCRE lmplementers are responsible for implementing the mechanism by which global arrays are designated
At the time of publication of this specification, the only global arrays required m the Java Card API 2 1 are the APDU buffer and the byte array input parameter (bArray) to the applet's install method
Note - Because of its global status, the API specifies that the APDU buffer is cleared to zeroes whenever an applet is selected, before the JCRE accepts a new APDU command This is to prevent an applet's potentially sensitive data from being "leaked" to another applet via the global APDU buffer The APDU buffer can be accessed from a shared interface object context and is suitable for passing data across applet contexts The applet is responsible for protecting secret data that may be accessed from the APDU buffer
6.2.3 JCRE Privileges
Because it is the "system" context, the JCRE context has a special pπvilege It can invoke a method of any object on the card For example, assume that object X is owned by applet A Normally, only context A can access the fields and methods of X But the JCRE context is allowed to invoke any of the methods of X Dunng such an invocation, a context switch occurs from the JCRE context to the applet context that owns X
Note - The JCRE can access both methods and fields of X Method access is the mechanism by which the JCRE enters an applet context Although the JCRE could invoke any method through the firewall, it shall only invoke the select, process, deselect, and getShareablelnterfaceOb^ect (see 6 2 7 1) methods defined in the Applet class
The JCRE context is the currently active context when the VM begins running after a card reset The JCRE context is the "root" context and is always either the currently active context or the bottom context saved on the stack
6.2.4 Shareable Interfaces
Shareable interfaces are a new feature in the Java Card API 2 1 to enable applet interaction A shareable interface defines a set of shared interface methods These interface methods can be mvoked from one applet context even if the object implementing them is owned by another applet context
In this specification, an object instance of a class implementing a shareable interface is called a Shareable Interface Object (SIO)
To the owning context, the SIO is a normal object whose fields and methods can be accessed To any other context, the SIO is an mstance of the shareable interface, and only the methods defined in the shareable interface are accessible All other fields and methods of the SIO are protected by the firewall
Shareable interfaces provide a secure mechanism for inter-applet communication, as follows
1 To make an object available to another applet, applet A first defines a shareable interface, SI A shareable interface extends the interface 3 avacard . framework . Shareable The methods defined in the shareable interface, SI, represent the services that applet A makes accessible to other applets
2 Applet A then defines a class C that implements the shareable interface SI C implements the methods defined m SI C may also define other methods and fields, but these are protected by the applet firewall Only the methods defined in SI are accessible to other applets Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
3 Applet A creates an object instance O of class C O belongs to applet A, and the firewall allows A to access any of the fields and methods of O
4 To access applet A's object O, applet B creates an object reference SIO of type SI
5 Applet B invokes a special method (JCSystera getAppletShareablelnterf aceOb3ect, descπbed in paragraph 6 2 7 2) to request a shared interface object reference from applet A
6 Applet A receives the request and the AID of the requester (B) via
Applet getshareablelnterf aceOb3 ect, and determines whether or not it will share object O with applet B
7 If applet A agrees to share with applet B, A responds to the request with a reference to O This reference is cast to type Shareable so that none of the fields or methods of O are visible
8 Applet B receives the object reference from applet A, casts it to type SI, and stores it m object reference SIO Even though SIO actually refers to A's object O, SIO is of type SI Only the shareable interface methods defined in SI are visible to B The firewall prevents the other fields and methods of O from being accessed by B
9 Applet B can request service from applet A by invoking one of the shareable interface methods of SIO Dunng the invocation the Java Card VM performs a context switch The oπgtnal currently active context (B) is saved on a stack and the context of the owner (A) of the actual object (O) becomes the new currently active context A's implementation of the shareable interface method (SI method) executes in A's context
10 The SI method can find out the AID of its client (B) via the JCSystem getPreviousContextAID method This is descπbed in paragraph 6 2 5 The method determines whether or not it will perform the service for applet B
11 Because of the context switch, the firewall allows the SI method to access all the fields and methods of object O and any other object owned by A At the same time, the firewall prevents the method from accessing non-shared objects owned by B
12 The SI method can access the parameters passed by B and can provide a return value to B
13 Dunng the return, the Java Card VM performs a restoring context switch The oπginal currently active context (B) is popped from the stack, and again becomes the current context
14 Because of the context switch, the firewall agam allows B to access any of its objects and prevents B from accessmg non-shared objects owned by A
6.2.5 Determining the Previous Context
When an applet calls JCSystem getPreviousContextAID, the JCRE shall return the mstance AID of the applet mstance active at the time of the last context switch
6.2.5.1 The JCRE Context
The JCRE context does not have an AID If an applet calls the getPreviousContextAID method when the applet context was entered directly from the JCRE context, this method returns null
If the applet calls getPreviousContextAID from a method that may be accessed either from within the applet itself or when accessed via a shareable interface from an external applet, it shall check for null return before performing caller AID authentication Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
6.2.6 Shareable Interface Details
A shareable interface is simply one that extends (either directly or indirectly) the tagging interface j avacard framework Shareable This Shareable interface is similar m concept to the Remote interface used by the RMI facility, in which calls to the interface methods take place across a local/remote boundary
6.2.6.1 The Java Card Shareable Interface
Interfaces extending the Shareable tagging interface have this special property calls to the interface methods take place across Java Card's applet firewall boundary via a context switch
The Shareable interface serves to identify all shared objects Any object that needs to be shared through the applet firewall shall directly or indirectly implement this interface Only those methods specified in a shareable interface are available through the firewall
Implementation classes can implement any number of shareable interfaces and can extend other shareable implementation classes
Like any Java platform interface, a shareable interface simply defines a set of service methods A service provider class declares that it "implements" the shareable interface and provides implementations for each of the service methods of the interface A service client class accesses the services by obtaining an object reference, casting it to the shareable interface type if necessary, and invoking the service methods of the interface
The shareable interfaces within the Java Card technology shall have the following properties
• When a method in a shareable interface is invoked, a context switch occurs to the context of the object's owner
• When the method exits, the context of the caller is restored
• Exception handling is enhanced so that the currently active context is correctly restored dunng the stack frame unwinding that occurs as an exception is thrown
6.2.7 Obtaining Shareable Interface Objects
Inter-applet communication is accomplished when a client applet invokes a shareable interface method of a SIO belongmg to a server applet In order for this to work, there must be a way for the client applet to obtain the SIO from the server applet in the first place The JCRE provides a mechanism to make this possible The Applet class and the JCSystem class provide methods to enable a client to request services from the server
6.2.7.1 The Method Applet .getShareablelnterfaceObject
This method is implemented by the server applet instance It shall be called by the JCRE to mediate between a client applet that requests to use an object belonging to another applet, and the server applet that makes its objects available for sharing
The default behavior shall return null, which indicates that an applet does not participate m inter-applet communication
A server applet that is intended to be invoked from another applet needs to override this method This method should examme the clientAiD and the parameter If the clientAiD is not one of the expected AIDs, the method should return null Similarly, if the parameter is not recognized or if it is not allowed for the Java ™ Card ™ Runtime Envirorment (JCRE) 2 1 Specification
clientAiD, then the method also should return null Otherwise, the applet should return an SIO of the shareable interface type that the client has requested
The server applet need not respond with the same SIO to all clients The server can support multiple types of shared interfaces fcr different purposes and use clientAiD and parameter to determine which -and of SIO to return to the client
6.2.7.2 The Method JCSystem. getAppletShareablelnterfaceOb ect
The JCSystem class contains the method getAppletShareablelnterf aceOb3ect, which is mvoked by a client applet to communicate with a server applet
The JCRE shall implement this method to behave as follows
1 The JCRE searches its internal applet table for one with serverAlD If not found, null is returned.
2 The JCRE vokes this applet's getShareablelnterfaceObject method, passing the clientAiD of the caller and the parameter
3 A context switch occurs to the server applet, and its implementation of etshareablelnterf aceθb3 ect proceeds as described in the previous section The server applet returns a SIO (or null)
4 getAppletShareablelnterf aceOb] ect returns the same SIO (or null) to its caller
For enhanced secuπty, the implementation shall make it impossible for the client to tell which of the following conditions caused a null value to be returned
• The serverAlD was not found
• The server applet does not participate in mter-applet communication
• The server applet does not recognize the clientAiD or the parameter
• The server applet won't communicate with this client
• The server applet won't communicate with this client as specified by the parameter
6.2.8 Class and Object Access Behavior
A static class field is accessed when one of the following Java bytecodes is executed getstatic, putstatic
An object is accessed when one of the following Java bytecodes is executed using the object's reference getfield, putfield, mvokevirtual , mvokeinterf ace , athrow, <T>aload, <T>astore, array-length, checkcast , instanceof
<T> refers to the vanous types of array bytecodes, such as baload, sastore, etc
This list also mcludes any special or optimized forms of these bytecodes that may be implemented m the Java Card VM, such as getf ιeld_b, sgetf ιeld_s_thιs, etc
Prior to performing the work of the bytecode as specified by the Java VM, the Java Card VM will perform an access check on the referenced object If access is denied, then a secur tyException is thrown
The access checks performed by the Java Card VM depend on the type and owner of the referenced object, the bytecode, and the currently active context They are described in the following sections Java ™ Card ™ Runtime Environment (JCRE) 2.1 Specification
6.2.8.1 Accessing Static Class Fields
Bytecodes: getstatic, putstatic
■ If the JCRE is the cutτently active context, then access is allowed.
■ Otherwise, if the bytecode is putstatic and the field being stored is a reference type and the reference being stored is a reference to a temporary JCRE Entry Point Object or a global array then access is denied.
■ Otherwise, access is allowed
6.2.8.2 Accessing Array Objects
Bytecodes:
<T>aload, <T>astore, arraylength, checkcast, lnsta-nceof
■ If the JCRE is the currently active context, then access is allowed.
■ Otherwise, if the bytecode is aastore and the component being stored is a reference type and the reference being stored is a reference to a temporary JCRE Entry Point Object or a global array then access is denied.
■ Otherwise, if the aπay is owned by the currently active context, then access is allowed.
■ Otherwise, if the array is designated global, then access is allowed
■ Otherwise, access is denied.
6.2.8.3 Accessing Class Instance Object Fields
Bytecodes: getfield, putfield
■ If the JCRE is the currently active context, then access is allowed.
■ Otherwise, if the bytecode is putfield and the field being stored is a reference type and the reference being stored is a reference to a temporary JCRE Entry Point Object or a global array then access is denied.
■ Otherwise if the object is owned by the currently active context, then access is allowed
■ Otherwise, access is denied
6.2.8.4 Accessing Class Instance Object Methods
Bytecodes. mvokevirtual
■ If the object is owned by the currently active context, then access is allowed. Context is switched to the object owner's context.
■ Otherwise, if the object is designated a JCRE Entry Point Object, then access is allowed. Context is switched to the object owner's context (shall be JCRE) Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
■ Otherwise, if JCRE is the currently active context, then access is allowed Context is switched to the object owner's context
■ Otherwise, access is denied
6.2.8.5 Accessing Standard Interface Methods
Bytecodes invokeinterface
■ If the object is owned by the currently active context, then access is allowed
■ Otherwise, if the JCRE is the currently active context, then access is allowed Context is switched to the object owner's context
■ Otherwise, access is denied
6.2.8.6 Accessing Shareable Interface Methods
Bytecodes invokeinterface
■ If the object is owned by the currently active context, then access is allowed
■ Otherwise, if the object's class implements a Shareable interface, and if the interface being mvoked extends the Shareable interface, then access is allowed Context is switched to the object owner's context
■ Otherwise, if the JCRE is the currently active context, then access is allowed Context is switched to the object owner's context
■ Otherwise, access is denied
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
6.2.8.7 Throwing Exception Objects
Bytecodes athro
■ If the object is owned by the currently active context, then access is allowed
■ Otherwise, if the object is designated a JCRE Entry Point Object, then access is allowed
■ Otherwise, if the JCRE is the currently active context, then access is allowed
■ Otherwise, access is denied
6.2.8 8 Accessing Class Instance Objects
Bytecodes checkcast, instanceof
■ If the object is owned by the currently active context, then access is allowed
■ Otherwise, if JCRE is the currently active context, then access is allowed
■ Otherwise, if the object is designated a JCRE Entry Point Object, then access is allowed
■ Otherwise, if the JCRE is the currently active context, then access is allowed
■ Otherwise, access is denied
6.2.8.9 Accessing Standard Interfaces
Bytecodes checkcast, instanceof
■ If the object is owned by the currently active context, then access is allowed
■ Otherwise, if the JCRE is the currently active context, then access is allowed
■ Otherwise, access is denied
6.2.8.10 Accessing Shareable Interfaces
Bytecodes checkcast, instanceof
■ If the object is owned by the currently active context, then access is allowed
■ Otherwise, if the object's class implements a Shareable interface, and if the object is being cast into (checkcast) or is an mstance of (instanceof) an interface that extends the Shareable interface, then access is allowed
■ Otherwise, if the JCRE is the currently active context, then access is allowed
■ Otherwise, access is denied Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
6.3 Transient Objects and Applet contexts
Transient objects of CLEAR_ON_RESET type behave like persistent objects in that they can be accessed only when the currently active applet context is the same as the owner of the object (the currently active applet context at the time when the object was created)
Transient objects of CLEAR_ON_DESELECT type can only be created or accessed when the currently active applet context is the currently selected applet context If any of the akeTransient factory methods is called to create a CLEAR_ON_DESELECT type transient object when the currently active applet context is not the currently selected applet context, the method shall throw a System-Exception with reason code of ILLEGAL_TRANSIENT If an attempt is made to access a transient object of CLEAR_ON_DESELECT type when the currently active applet context is not the currently selected applet context, the JCRE shall throw a Security-Exception
Applets that are part of the same package share the same group context Every applet mstance from a package shares all its object mstances with all other mstances from the same package (This mcludes transient objects of both CLEAR_ON_RESET type and CLEAR_ON_DESELECT type owned by these applet instance )
The transient objects of CLEAR_ON_DESELECT type owned by any applet mstance within the same package shall be accessible when any of the applet mstances m this package is the currently selected applet
Java ™ Card ™ Runtime Environment (JCRE) 2.1 Specification
7. Transactions and Atomicity
A transaction is a logical set of updates of persistent data. For example, transferring some amount of money from one account to another is a banking transaction. It is important for transactions to be atomic: either all of the data fields are updated, or none are. The JCRE provides robust support for atomic transactions, so that card data is restored to its onginal pre-transaction state if the transaction does not complete normally. This mechanism protects agamst events such as power loss in the middle of a transaction, and agamst program errors that might cause data corruption should all steps of a transaction not complete normally.
7.1 Atomicity
Atomicity defines how the card handles the contents of persistent storage after a stop, failure, or fatal exception dunng an update of a single object or class field or array component. If power is lost dunng the update, the applet developer shall be able to rely on what the field or array component contains when power is restored.
The Java Card platform guarantees that any update to a smgle persistent object or class field will be atomic. In addition, the Java Card platform provides single component level atomicity for persistent arrays. That is, if the smart card loses power dunng the update of a data element (field in an object class or component of an array) that shall be preserved across CAD sessions, that data element will be restored to its previous value.
Some methods also guarantee atomicity for block updates of multiple data elements. For example, the atomicity of the Util . arrayCopy method guarantees that either all bytes are correctly copied or else the destination array is restored to its previous byte values
An applet might not require atomicity for array updates. The Ut I 1. arrayCopyNonAtomi c method is provided for this purpose. It does not use the transaction commit buffer even when called with a transaction in progress
7.2 Transactions
An applet might need to atomically update several different fields or array components in several different objects. Either all updates take place correctly and consistently, or else all fields components are restored to their previous values.
The Java Card platform supports a transactional model in which an applet can designate the beginning of an atomic set of updates with a call to the JCSystem . begmTransaction method. Each object update after this 47/1
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
point is conditionally updated The field or array component appears to be update — reading the field array component back yields its latest conditional value; — but the update is not yet committed
When the applet calls JCSystem. co mitTransaction, all conditional updates are committed to persistent storage If power is lost or if some other system failure occurs pnor to the completion of JCSystem commitTransaction, all conditionally updated fields or array components are restored to their previous values If the applet encounters an internal problem or decides to cancel the transaction, it can programmatically undo conditional updates by calling JCSystem. abortTransaction
7.3 Transaction Duration
A transaction always ends when the JCRE regains programmatic control upon return from the applet's select, deselect, process or install methods This is true whether a transaction ends normally, with an applet's call to commitTransaction, or with an abortion of the transaction (either programmatically by the applet, or by default by the JCRE) For more details on transaction abortion, refer to paragraph 7 6
Transaction duration is the life of a transaction between the call to JCSystem. beginTransact ion, and either a call to commitTransaction or an abortion of the transaction
7.4 Nested Transactions
The model currently assumes that nested transactions are not possible There can be only one transaction in progress at a hme If JCSystem. beginTransaction is called while a transaction is already ln'progress, then a TransactionException is thrown
The JCSystem . transactionDepth method is provided to allow you to determine if a transaction is m progress
7.5 Tear or Reset Transaction Failure
If power is lost (tear) or the card is reset or some other system failure occurs while a transaction is in progress, then the JCRE shall restore to their previous values all fields and array components conditionally updated smce the previous call to JCSystem. beginTransaction
This action is performed automatically by the JCRE when it reinitializes the card after recovering from the power loss, reset, or failure The JCRE determines which of those objects (if any) were conditionally updated, and restores them
Note - Object space used by instances created dunng the transaction that failed due to power loss or card reset can be recovered by the JCRE 47/2
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
7.6 Aborting a Transaction
Transactions can be aborted either by an applet or by the JCRE
7.6.1 Programmatic Abortion
If an applet encounters an internal problem or decides to cancel the transaction, it can programmatically undo conditional updates by calling JCSystem abortTransaction If this method is called, all conditionally updated fields and array components since the previous call to JCSystem beginTransaction are restored to their previous values, and the JCSystem transactionDepth value is reset to 0
7.6.2 Abortion by the JCRE
If an applet returns from the select, deselect , process , or install methods with a transaction in progress, the JCRE automatically aborts the transaction If a return from any of select, deselect , process or install methods occurs with a transaction in progress, the JCRE acts as if an exception was thrown
7.6.3 Cleanup Responsibilities of the JCRE
Object instances created dunng the transaction that is being aborted can be deleted only if all references to these objects can be located and converted into null . The JCRE shall ensure that references to objects created dunng the aborted transaction are equivalent to a null reference
7.7 Transient Objects
Only updates to persistent objects participate in the transaction Updates to transient objects are never undone, regardless of whether or not they were "inside a transaction "
7.8 Commit Capacity
Since platform resources are limited, the number of bytes of conditionally updated data that can be accumulated dunng a transaction is limited The Java Card technology provides methods to determine how much commit capacity is available on the implementation The commit capacity represents an upper bound on the number of conditional byte updates available The actual number of conditional byte updates available may be lower due to management overhead.
An exception is thrown if the commit capacity is exceeded during a transaction 47/3
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
8. API Topics
The topics m this chapter complement the requirements specified in the Java Card 2 1 API Draft 2 Specification The first topic is the Java Card I/O functionality, which is implemented entirely in the APDU class The second topic is the API supporting Java Card security and cryptography The JCSystem class encapsulates the API version level
Transactions within the API
Unless specifically called out in the Java Card 2 1 API Specification, the implementation of the API classes shall not initiate or otherwise alter the state of a transaction if one is in progress
Resource Use within the API
Unless specifically called out in the Java Card 2 1 API Specification, the implementation shall support the invocation of API instance methods, even when the owner of the object mstance is not the currently selected applet In other words, unless specifically called out, the implementation shall not use resources such as transient objects of CLEAR_ON_DESELECT type
Exceptions thrown by API classes
All exception objects thrown by the API implementation shall be temporary JCRE Entry Point Objects Temporary JCRE Entry Point Objects cannot be stored in class vaπables, mstance vaπables or array components (See 6 2 1)
8.1 The APDU Class
The APDU class encapsulates access to the ISO 7816-4 based I O across the card senal lme The APDU Class is designed to be independent of the underlying I O transport protocol
The JCRE may support T=0 or T=l transport protocols or both
8.1.1 T=0 specifics for outgoing data transfers
For compatibility with legacy CAD/terminals that do not support block chained mechanisms the APDU Class allows mode selection via the setOutgoingNoChaimng method 47/4
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
8.1.1.1 Constrained transfers with no chaining
When the no chammg mode of output transfer is requested by the applet by calling the setOutgoingNoChaming method, the following protocol sequence shall be followed
Note - when the no chammg mode is used, calls to the waitExtension method shall throw an APDUException with reason code IL EGA _USE
Notation
Le = CAD expected length
Lr = Applet response length set via setOutgomgLength method
<INS> = the protocol byte equal to the mcommg header INS byte, which mdicates that all data bytes will be transferred next
<~INS> = the protocol byte that is the complement of the mcommg header INS byte, which mdicates about 1 data byte being transferred next
<SW1,SW2> = the response status bytes as in IS07816-4
ISO 7816-4 CASE 2
Le == Lr
1 The card sends Lr bytes of output data using the standard T=0 <INS> or <~INS> procedure byte mechanism
2 The card sends <SW1,SW2> completion status on completion of the Apple . process method
Lr < Le
1 The card sends <0x61,Lr> completion status bytes
2 The CAD sends GET RESPONSE command with Le = Lr
3 The card sends Lr bytes of output data using the standard T=0 <INS> or <~INS> procedure byte mechanism
4 The card sends <SW1,SW2> completion status on completion of the Apple . process method
Lr > Le
1 The card sends Le bytes of output data usmg the standard T=0 <INS or <~INS> procedure byte mechanism
2 The card sends <0x61,(Lr-Le)> completion status bytes
3 The CAD sends GET RESPONSE command with new Le <= Lr
4 The card sends (new) Le bytes of output data usmg the standard T=0 <INS> or <~INS> procedure byte mechanism 47/5
Java ™ Card ™ Runtime Environment (JCRE) 2 1 S ecification
5 Repeat steps 2-4 as necessary to send the remaming output data bytes (Lr) as required
6 The card sends <SW1,SW2> completion status on completion of the Applet process method
ISO 7816-4 CASE 4
In Case 4, Le is determined after the following initial exchange
1 The card sends <0x61,Lr status bytes>
2 The CAD sends GET RESPONSE command with Le <= Lr
The rest of the protocol sequence is identical to CASE 2 described above
If the applet aborts early and sends less than Le bytes, zeros may be sent instead to fill out the length of the transfer expected by the CAD
8.1.1.2 Regular Output transfers
When the no chammg mode of output transfer is not requested by the applet (that is, the setOutgoing method is used), the following protocol sequence shall be followed
Any ISO-7816-3/4 compliant T=0 protocol transfer sequence may be used
Note - The waitExtension method may be mvoked by the applet between successive calls to sendBytes or sendBytesLong methods The waitExtension method shall request an additional work waiting time (ISO 7 16-3) using the 0x60 procedure byte
8.1.1.3 Additional T=0 requirements
At any time, when the T=0 output transfer protocol is in use, and the APDU class is awaitmg a GET RESPONSE command from the CAD in reaction to a response status of <0x61, xx> from the card, if the CAD sends in a different command, the sendBytes or the sendBytesLong methods shall throw an APDUException with reason code NO_T0_GETRESPONSE
Calls to sendBytes or sendBytesLong methods from this point on shall result in an APDUException with reason code ILLEGAL_USE If an ISOException is thrown by the applet after the NO_T0_GETRESPONSE exception has been thrown, the JCRE shall discard the response status in its reason code The JCRE shall restart APDU processing with the newly received command and resume APDU dispatchmg
8.1.2 T= 1 specifics for outgoing data transfers 8.1.2.1 Constrained transfers with no chaining
When the no chammg mode of output transfer is requested by the applet by calling the setOutgoingNoChaming method, the following protocol sequence shall be followed
Notation
Le = CAD expected length
Lr = Applet response length set via setOutgoingLength method 47/6
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
The transport proto' ol sequence shall not use block chaming Specifically, the M-bit (more data bit) shall not be set in the PCB of the I-blocks dunng the transfers (ISO 7816-3) In other words, the entire outgomg data (Lr bytes) shall be transferred in one I-block
(If the applet aborts early and sends less than Lr bytes, zeros shall be sent instead to fill out the remaining length of the block )
Note - When the no chaining mode is used, calls to the waitExtension method shall throw an
APDUException with reason code ILLEGAL_USE
8 1.2.2 Regular Output transfers
When the no chammg mode of output transfer is not requested by the applet I e the setOutgoing method is used, the following protocol sequence shall be followed
Any ISO-7816-3/4 compliant T= 1 protocol transfer sequence may be used
Note - The waitExtension method may be mvoked by the applet between successive calls to sendBytes or sendBytesLong methods The waitExtension method shall send an S-block command with WTX request of INF units, which is equivalent to a request of 1 additional work waiting tune in T=0 mode (See ISO
7816-3)
8.2 The security and crypto packages
The getlnstance method m the following classes return an implementation mstance in the context of the calling applet of the requested algoπthm
3avacard security MessageDigest
3avacard. security Signature javacard. security Random-Data
3avacardx. crypto Cipher
An implementation of the JCRE may implement 0 or more of the algonthms listed m the API When an algoπthm that is not implemented is requested this method shall throw a CryptoException with reason code NO_SUCH_ALGORITHM
Implementations of the above classes shall extend the corresponding base class and implement all the abstract methods All data allocation associated with the implementation mstance shall be performed at the tune of mstance construction to ensure that any lack of required resources can be flagged early dunng the mstallation of the applet
Similarly, the buildKey method of the 3 avacard security keyBuilder class returns an implementation mstance of the requested Key type The JCRE may implement 0 or more types of keys When a key type that is not implemented is requested, the method shall throw a CryptoException with reason code
NO SUCH ALGORITHM 47/7
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
Implementations of key types shall implement the associated mterface All data allocation associated with the key implementation instance shall be performed at the time of instance construction to ensure that any lack of required resources can be flagged early during the installation of the applet
8.3 JCSystem Class
In Java Card 2 1, the getversion method shall return (short) 0x0201
47/8
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
9. Virtual Machine Topics
The topics in this chapter detail virtual machme specifics
9.1 Resource Failures
A lack of resources condition (such as heap space) which is recoverable shall result in a SystemException with reason code NO_RESOURCE The factory methods in JCSystera used to create transient arrays throw a SystemException with reason code NO_TRANSIENT_SPACE to indicate lack of transient space
All other (non-recoverable) virtual machine errors such as stack overflow shall result in a virtual machme error These conditions shall cause the virtual machme to halt When such a non-recoverable virtual machine error occurs, an implementation can optionally require the card to be muted or blocked from further use
47/9
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
10. Applet Installer
Applet installation on smart cards using Java Card technology is a complex topic The Java Card API 2 1 is intended to give JCRE implementers as much freedom as possible in their implementations However, some basic common specifications are required m order to allow Java Card applets to be installed without knowing the implementation details of a particular installer
This specification defines the concept of an Installer and specifies mmimal mstallation requirements in order to achieve interoperability across a wide range of possible Installer implementations
The Applet Installer is an optional part of the JCRE 2 1 Specification That is, an implementation of the JCRE does not necessarily need to include a post-issuance Installer However, if implemented, the mstaller is requ-red to support the behavior specified in section 9 1
10.1 The Installer
The mechanisms necessary to install an applet on smart cards usmg Java Card technology are embodied in an on-card component called the Installer
To the CAD the Installer appears to be an applet It has an AID, and it becomes the currently selected applet when this AID is successfully processed by a SELECT command Once selected, the Installer behaves m much the same way as any other applet
• It receives all APDUs just like any other selected applet
• Its design specification prescπbes the various kinds and formats of APDUs that it expects to receive along with the semantics of those commands under various preconditions
• It processes and responds to all APDUs that it receives Incorrect APDUs are responded to with an error condition of some kmd
• When another applet is selected (or when the card is reset or when power is removed from the card), the Installer becomes deselected and remains suspended until the next time that it is SELECTed
10.1.1 Installer Implementation
The Installer need not be implemented as an applet on the card The requirement is only that the Installer functionality be SELECTable The corollary to this requirement is that Installer component shall not be able to be invoked when a non-Installer applet is selected nor when no applet is selected 47/10
Java ™ Card ™ Runtime Envu-onment (JCRE) 2 1 Specification
Obviously, a JCRE implementer could choose to implement the Installer as an applet If so, then the Installer might be coded to extend the Applet class and respond to invocations of the select, process, and deselect methods
But a JCRE implementer could also implement the Installer in other ways, as long as it provides the SELECTable behavior to the outside world In this case, the JCRE implementer has the freedom to provide some other mechanism by which APDUs are delivered to the Installer code module
10.1.2 Installer AID
Because the Installer is SELECTable, it shall have an AID JCRE implementers are free to choose their own AID by which their Installer is selected Multiple installers may be implemented
10.1.3 Installer APDUs
The Java Card API 2 1 does not specify any APDUs for the Installer JCRE unplementers are entirely free to choose their own APDU commands to direct their Installer in its work
The model is that the Installer on the card is dnven by an mstallation program runnmg on the CAD In order for installation to succeed, this CAD mstallation program shall be able to
• Recognize the card
• SELECT the Installer on the card
• Drive the installation process by sending the appropriate APDUs to the card Installer These APDUs will contain
> Authentication information, to ensure that the mstallation is authorized The applet code to be loaded mto the card's memory
> Linkage information to link the applet code with code already on the card
> Instance initialization parameter data to be sent to the applet's install method
The Java Card API 2 1 does not specify the details of the CAD mstallation program nor the APDUs passed between it and the installer
10.1.4 Installer Behavior
JCRE implementers shall also define other behaviors of their Installer, including
• Whether or not mstallation can be aborted and how this is done
• What happens if an exception, reset, or power fail occurs dunng mstallation
• What happens if another applet is selected before the Installer is finished with its work
The JCRE shall guarantee that an applet will not be deemed successfully installed if
• the applet's install method throws an exception before successful return from the Applet register method (Refer to paragraph 9 2 ) 47/11
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
10.1.5 Installer Privileges
Although an Installer may be implemented as an applet, an Installer will typically require access to features that are not available to "other applets For example, depending on the JCRE implementer's implementation, the Installer will need to
• Read and wπte directly to memory, bypassing the object system and/or standard secuπty
• Access objects owned by other applets or by the JCRE
• Invoke non-entry point methods of the JCRE
• Be able to invoke the install method of a newly installed applet
Again, it is up to each JCRE implementer to determine the Installer implementation and supply such features in their JCRE implementations as necessary to support their Installer JCRE implementers are also responsible for the security of such features, so that they are not available to normal applets
10.2 The Newly Installed Applet
There is a smgle mterface between the Installer and the applet that is being installed After the Installer has correctly prepared the applet for execution (performed steps such as loading and linking), the Installer shall invoke the applet's install method This method is defined in the Applet class
The precise mechanism by which an applet's install method is mvoked from the Installer is a JCRE implementer-defined implementation detail However, there shall be a context switch so that any context- related operations performed by the install method (such as creating new objects) are done m the context of the new applet and not m the context of the Installer The Installer shall also ensure that array objects created dunng applet class initialization (<chnιt>) methods are also owned by the context of the new applet
The installation of an applet is deemed complete if all steps are completed without failure or an exception being thrown, up to and including successful return from executmg the Applet register method At that point, the installed applet will be selectable
The maximum size of the parameter data is 32 bytes And for secuπty reasons, the bArray parameter is zeroed after the return (just as the APDU buffer is zeroed on return from an applet's process method )
10.2.1 Installation Parameters
Other than the maximum size of 32 bytes, the Java Card API 2 1 does not specify anything about the contents of the mstallation parameter byte array segment This is fully defined by the applet designer and can be in any format desired In addition, these installation parameters are intended to be opaque to the Installer
JCRE implementers should design their Installers so that it is possible for an installation program running in a CAD to specify an arbitrary byte array to be delivered to the Installer The Installer simply forwards this byte array to the target applet's install method in the bArray parameter A typical implementation might define a JCRE lmplementer-propπetary APDU command that has the semantics "call the applet's install method passing the contents of the accompanying byte array " 47/12
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
11. API Constants
Some of the API classes don't have values specified for their constants in the - αvα Card API 2 1 Reference If constant values are not specified consistently by implementers of this JCRE 2 1 Specification, industry-wide interoperability is impossible This chapter provides the required values for constants that are not specified in the Java Card API 2 1 Reference
Class javacard framework APDU public static final byte PROTOCOL TO = 0, public static final byte PROTOCO Tl = 1,
Class javacard framework APDUException public static final short I EGAL_USE = 1, public static final short BUFFER_BOUNDS = 2, public static final short BAD_LENGT-- = 3 , public static final short IO_ERROR = 4, public static final short NO_T0_GETRESPONSE = OxAA,
Interface javacard framework IS07816 public final static short SW_NO_ERROR = (short) 0x9000, public final static short SW_BYTES_REMAINING_00 -- 0x6100, public final static short SW_WRONG_ ENGTH = 0x6700, public static final short SW_SECϋRITY_STATUS_NOT_SATISFIED = 0x698 , public final static short SW_FILE_INVAI-ID = 0x6983, public final static short S _DATA_INVALID = 0x6984, public final static short S _CONDITIONS_NOT_SATISFIED = 0x6985, public final Static short SW_COMMAND_NOT_AL OWED = 0x6986, public final static short S _APPLET_SE ECT_FAI ED -- 0x6999, public final static short SW_WRONG_DATA = 0x6A80, public final static short S _FUNC_NOT_SUPPORTED = 0x6A81, public final static short SW_FILE_NOT_FOUND = 0x6A82, public final static short SW_RECORD_NOT_FOUND = 0x6A83, public final static short S _INC0RRECT_P1P2 = 0x6A86, public final static short SW_WR0NG_P1P2 = 0x6B00, public final static Short S _CORRECT_ ENGTH_00 0X6C00, public final static short S _INS_NOT_SUPPORTED = 0x6D00, public final static short SW_CI-A_NOT_SUPPORTED = 0x6E00, public final static Short SW_UNKNOWN = 0x6F0O, public static final short S _FILE_FULL = 0x6A84, public final static byte OFFSET_CLA = 0, public final static byte OFFSET_INS = 1, public final static byte 0FFSET_P1 = 2, public final static byte OFFSET_P2 = 3, 47/13
Java ™ C?rd ™ Runtime Environment (JCRE) 2 1 Specification public final static byte OFFΞETJLC = 4, public final static byte OFFSET_CDATA-- 5, public final static byte CLA_IS07816 = 0x00; public final static byte INS_SELECT -= (byte) 0xA4, public final static byte INS_EXTERNAL_AUTHENTICATE = (byte) 0x82;
Class javacard.framework.JCSystem public static final byte NOT_A_TRANSIENT_OBJECT = 0; public static final byte CLEAR_ON_RESET = 1, public static final byte CLEAR_ON_DESELECT = 2 ;
Class javacard.framework.PINException public static final short ILLEGAL_VALUE = 1;
Class javacard.framework.SystemException public static final short ILLEGAL_VALUE = 1; public static final short NO_TRANSIENT_SPACE = 2, public static final short ILLEGAL_TRANSIENT = 3; public static final short ILLEGAL_AID = 4; public static final short NO_RESOURCE = 5;
Class javacard.security.CryptoException public static final short ILLEGAL_VALUE = 1, public static final short UNINITIALIZED EY = 2, public static final short NO_SUCH_ALGORITHM = 3, public static final short INVALID_INIT = 4; public static final short ILLEGAL_USE = 5;
Class javacard. secuπty.KeyBuilder public static final byte T'YPE_DES_TRANSIENT_RESET -- 1; public static final byte T'YPE_DES_TRANSIENT_DESELECT = 2; public static final byte T'YPE_DES = 3; public static final byte T'YPE_RSA_PUBLIC = 4; public static final byte T'YPE_RSA_PRIVATE = 5 ; public static final byte T'YPE_RSA_CRT_PRIVATE = 6; public static final byte T'YPE_DSA_PUBLIC = 7; public static final byte T'YPE_DSA_PRIVATE = 8, public static final short LENGTH_DES = 64; public static final short LENGTH_DES3_2KEY = 128; public static final short LENGTH_DES3_ KEY = 192; public static final short LENGTH_RSA_512 = 512, public static final short LENGTH_RSA_768 = 768; public static final short LENGTH_RSA_1024 = 1024; public static final short LENGTH_RSA_2048 = 2048; public static final short LENGTH_DSA_512 - 512; public static final short LENGTH_DSA_768 = 768, public static final short LENGTH_DSA_1024 = 1024;
Class javacard. secuπty.MessageDigest public static final byte ALG_SHA = 1; public static final byte ALG_MD5 = 2 ; public static final byte ALG_RIPEMD160 = 3;
Class javacard. secuπty.RandomData public static final byte ALG_PSEUDO_RAMDOM = 1; public static final byte ALG_SECURE_RANDOM = 2 ;
Class javacard. security.Signature public static final byte ALG_DES_MAC4_NOPAD = 1, public static final byte ALG_DES_ AC8_NOPAD = 2; public static final byte ALG_DES_MAC4_IS09797_ 1 = 3 ; 47/14
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification public static final byte ALG_DEΞ_MAC8_IS09797_M1 = 4, public static final byte ALG_DES_MAC4_IS09797_M2 = 5, public static final byte ALG_DES_MAC8_IS09797_ 2 = 6, public static final byte ALG_DES_MAC4_PKCS5 = 7, public static final byte ALG_DES_MAC8_PKCS5 -- 8, public static final byte ALG_RSA_SHA_IS09796 = 9, public static final byte ALG_RSA_SHA_PKCS1 = 10, public static final byte ALG_RSA_ D5_PKCS1 = 11, public static final byte ALG_RSA_RIPEMD160_ISO9796 = 12, public static final byte ALG_RSA_RIPEMD160_PKCS1 = 13 , public static final byte ALG_DSA_SHA = 14, public static final byte MODE_SIGN = 1, public static final byte MODE VERIFY = 2,
Classjavacardx.crypto.Cipher public static final byte ALG_DES_CBC_NOPAD = 1, public static final byte ALG_DES_CBC_IS09797_M1 » 2, public static final byte ALG_DES_CBC_IS09797_M2 = 3, public static final byte ALG_DES_CBC_PKCS5 = 4, public static final byte ALG_DES_ECB_NOPAD = 5, public static inal byte ALG_DES_ECB_IS09797_M1 = 6, public static final byte ALG_DES_ECB_IS09797_M2 = 7, public static final byte ALG_DES_ECB_PKCS5 = 8, public static final byte ALG_RSA_IS014888 -- 9, public static final byte ALG_RSA_PKCS1 = 10, public static final byte MODE_DECRYPT = 1, public static final byte MODE ENCRYPT = 2,
47/15
Java ™ Card ™ Runtime Environment (JCRE) 2.1 Specification
Glossary
AID is an acronym for Application IDentifier as defined in ISO 7816-5.
APDU is an acronym for Application Protocol Data Unit as defined in ISO 7816-4.
API is an acronym for Application Programming Interface. The API defines calling conventions by which an application program accesses the operating system and other services.
Applet within the context of this document means a Java Card Applet, which is the basic unit of selection, context, functionality, and security in Java Card technology.
Applet developer refers to a person creating a Java Card applet using the Java Card technology specifications.
Applet firewall is the mechanism in the Java Card technology by which the VM prevents an applet from making unauthorized accesses to objects owned by other applet contexts or the JCRE context, and reports or otherwise addresses the violation.
Atomic operation is an operation that either completes in its entirety (if the operation succeeds) or no part of the operation completes at all (if the operation fails).
Atomicity refers to whether a particular operation is atomic or not and is necessary for proper data recovery in cases in which power is lost or the card is unexpectedly removed from the CAD.
ATR is an acronym for Answer to Reset. An ATR is a string of bytes sent by the Java Card after a reset condition.
CAD is an acronym for Card Acceptance Device. The CAD is the device in which the card is inserted.
Cast is the explicit conversion from one data type to another. c CK is the test suite to verify the compliance of the implementation of the Java Card Technology specifications. The cJCK uses the JavaTest tool to run the test suite.
Class is the prototype for an object in an object-oriented language. A class may also be considered a set of objects that share a common structure and behavior. The structure of a class is determined by the class variables that represent the state of an object of that class and the behavior is given by a set of methods associated with the class.
Classes are related in a class hierarchy. One class may be a specialization (a subclass) of another (its superclass), it may have reference to other classes, and it may use other classes in a client-server relationship.
Context (See Applet execution context.)
Currently active context The JCRE keeps track of the currently active Java Card applet context. When a virtual method is invoked on an object, and a context switch is required and permitted, the currently active 47/16
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
context is changed to correspond to the applet context that owns the object When that method returns, the previous context is restored Invocations of static methods have no effect on the currently active context The currently active context and shanng status of an object together determine if access to an object is permissible
Currently selected applet The JCRE keeps track of the currently selected Java Card applet Upon receiving a SELECT command with this applet's AID, the JCRE makes this applet the currently selected applet The JCRE sends all APDU commands to the currently selected applet
EEPROM is an acronym for Electncally Erasable, Programmable Read Only Memory
Firewall (see Applet Firewall)
Framework is the set of classes that implement the API This mcludes core and extension packages Responsibilities mclude dispatchmg of APDUs, applet selection, managing atomicity, and installing applets
Garbage collection is the process by which dynamically allocated storage is automatically reclaimed dunng the execution of a program
Instance variables, also known as fields, represent a portion of an object's internal state Each object has its own set of mstance variables Objects of the same class will have the same mstance vaπables, but each object can have different values
Instantiation, m object-oriented programming, means to produce a particular object from its class template This involves allocation of a data structure with the types specified by the template, and initialization of instance variables with either default values or those provided by the class's constructor function
JAR is an acronym for Java Archive JAR is a platform-independent file format that combines many files into one
Java Card Runtime Environment (JCRE) consists of the Java Card Virtual Machme, the framework, and the associated native methods
JC21RI is an acronym for the Java Card 2 1 Reference Implementation
JCRE implementer refers to a person creating a vendor-specific implementation usmg the Java Card API
JCVM is an acronym for the Java Card Virtual Machme The JCVM is the foundation of the OP card architecture The JCVM executes byte code and manages classes and objects It enforces separation between applications (firewalls) and enables secure data shanng
JDK is an acronym for Java Development Kit The JDK is a Sun Microsystems, Inc product that provides the environment required for programming in Java The JDK is available for a vanety of platforms, but most notably Sun Solans and Microsoft Windows®
Method is the name given to a procedure or routine, associated with one or more classes, m object-oriented languages
Namespace is a set of names which all names are unique
Object-Oriented is a programming methodology based on the concept of an object, which is a data structure encapsulated with a set of routines, called methods, which operate on the data
Objects, in object-oπented programming, are unique mstances of a data structure defined according to the template provided by its class Each object has its own values for the variables belonging to its class and can respond to the messages (methods) defined by its class 47/17
Java ™ Card ™ Runtime Environment (JCRE) 2 1 Specification
Package is a namespace within the Java programming language and can have classes and interfaces A package is the smallest unit within the Java programming language
Persistent object Persistent objects and their values persist from one CAD session to the next, indefinitely Objects are persistent by default Persistent object values are updated atonucally usmg transactions The term persistent does not mean there is an object-onented database on the card or that objects are serialized/deserialized, just that the objects are not lost when the card loses power
Shareable interface Defines a set of shared interface methods These mterface methods can be mvoked from one applet context when the object implementing them is owned by another applet context
Shareable interface object (SIO) An object that implements the shareable mterface
Transaction is an atomic operation in which the developer defines the extent of the operation by indicatmg in the program code the beginning and end of the transaction
Transient object. The values of transient objects do not persist from one CAD session to the next, and are reset to a default state at specified intervals Updates to the values of transient objects are not atomic and are not affected by transactions
47/18
1/5/99 12:49 PM Havnor: Stuff: JCRE D2 14DEC98: READ-ME-JCRE21-DF2.txt Page 1
Date: 16 December 1998
Dear Java Card Licensee,
JCRE21-DF2-14DEC98.zip contains a second draft of the Java Card 2.1 Runtime Environment specification, dated December 14, 1998, for Licensee review and comment. We have worked incorporate and clarify the document based upon the review feedback we've received to date.
Complete contents of the zip archive are as follows:
READ-ME-JCRE21 -DF2.txt - This READ ME text file
JCRE21 -DF2.pdf - "Java Card Runtime Environment (JCRE)
2.1 Specification" in PDF format JCRE21 -DF2-changebar.pdf - The revised document with change bars from previous version for ease of review.
Summary of changes:
1. This is now a draft 2 release and will be published on the public web site shortly.
2. New description of temporary JCRE Entry Point Objects has been introduced for purposes of restricting unauthorized access.
Firewall chapter 6.2.1.
3. Global arrays now have added security related restrictions similar to temporary JCRE Entry Point objects. Firewall chapter
6.2.2.
4. Detailed descriptions of the bytecodes with respect to storing restrictions for temporary JCRE Entry Point Objects and
Global arrays added. Chapter 6.2.8.
5. General statement about JCRE owned exception objects added in chapter 8.
6. Corrected description of Virtual machine resource failures in transient factory methods. Chapter 9.1.
The "Java Card Runtime Environment 2.1 Specification" specifies the minimum behavior and runtime environment for complete Java Card 2.1 implementation, as referred to by the Java Card APT 2.1 and Java Card 2.1 Virtual Machine Specification documents. This specification is required to ensure compatible operation of Java Card applets. The purpose of this specification document is to bring all the JCRE elements together in a concise manner as part of the Java Card 2.1 specification suite.
Please send review comments to <javaoem-javacard@sun.com> or to my address as below. On behalf of the Java Card team, I look forward to hearing from you.
Best,
Godfrey DiGiorgi
Godfrey DiGiorgi - godfrey.digiorgi@eng.sun.com
OEM Licensee Engineering
Sun Microsystems / Java Software
+1 408 343-1506 - FAX +1 408 517-5460

Claims

48What is claimed is:
1. A small footprint device comprising: a. at least one processing element; b. memory, and c. a context barrier, using said memory and running on said processing element, for isolating program modules from one another.
2. The small footprint device of claim 1 in which said at least one processing element is a virtual machine running on a processor.
3. The small footprint device of claim 2 in which said virtual machine runs on top of a card operating system.
4. The small footprint device of claim 1 in which groups of one or more program modules are run in separate contexts.
5. The small footprint device of claim 4 in which the context barrier is configured to prevent access from one program module to a program module in a different context.
6. The small footprint device of claim 4 in which said context barrier allocates separate respective name spaces for each context.
7. The small footprint device of claim 4 in which said context barrier allocates separate respective memory spaces for each context.
8. The small footprint device of claim 1 in which at least one program module comprises a plurality of applets.
9. The small footprint device of claim 1 in which said context barrier enforces at least one security check on at least one of principal, object or action to prevent access from a principal in one context to an object in a different context.
10. The small footprint device of claim 9 in which groups of one or more program modules are run in separate contexts. 49
11. The small footprint device of claim 10 in which the context barrier prevents access from one program module to a different program module.
12. The small footprint device of claim 10 in which at least one security check is based on partial name agreement between a principal and an object.
13. The small footprint device of claim 10 in which at least one security check is based on memory space agreement between a principal and an object.
14. A method of operating a small footprint device, comprising the step of preventing access from one program module to a different program modules using a context barrier.
15. The method of claim 14 in which the context barrier is implemented using a virtual machine.
16. The small footprint device of claim 15 in which groups of one or more program modules are run in separate contexts.
17. The method of claim 16 in which the context barrier prevents access from one program module to a different program module.
18. The method of claim 17 in which the context barrier will not permit a principal to access an object unless both principal and object are part of the same name space.
19. The method of claim 17 in which the context barrier will not permit a principal to access an object unless both principal and object are part of the same memory space.
20. The method of claim 14 in which the context barrier will not permit a principal to perform an action on an object unless both principal and object are part of the same context. 50
21. The method of claim 20 in which the context barrier will permit a principal to perform an action on an object when they are not part of the same context if the principal is authorized to perform the action on the object.
22. The method of claim 21 in which the principal is authorized if it passes at least one security check.
23. The method of claim 22 in which said at least one security check is one of a plurality of security checks.
24. The method of claim 21 in which, if a principal in a first context is authorized to perform one or more actions on an object in a second context, when the action is performed it will execute within the second context.
25. The method of claim 24 in which, when one or more actions are authorized in the second context, subsequent actions will be authorized based on executing in the second context, and a principal in the second context will be able to access objects in the second context.
26. The method of claim 25 in which, when one or more actions complete in the second context, execution will return to the first context.
27. The method of claim 24 in which, when action is undertaken in the second context that requires access to an object in a third context, the action will execute within the third context.
28. The method of claim 27 in which switches to a new context will occur any time action is authorized on an object in a new context.
29. A computer program product, comprising: a. a memory medium; and b. a computer controlling element comprising instructions for implementing a context barrier on a small footprint device. 51
30. The computer program product of claim 29 in which said memory medium is a carrier wave.
31. A computer program product, comprising: a. a memory medium; and b. a computer controlling element comprising instructions for separating a plurality of programs on a small footprint device by running them in respective contexts.
32. The computer program product of claim 31 in which said memory medium is a carrier wave.
33. A carrier wave carrying instructions for implementing a context barrier on a small footprint device over a communications link.
34. A carrier wave carrying instructions over a communications link for separating a plurality of programs on a small footprint device by running them in respective contexts.
35. A method of shipping code over a network, comprising the step of transmitting a block of code from a server, said block of code comprising instructions over a communications link for separating a plurality of programs on a small footprint device by running them in respective contexts.
EP00904409A 1999-01-22 2000-01-20 Techniques for implementing security on a small footprint device using a context barrier Revoked EP1155365B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP04005586.5A EP1434121B1 (en) 1999-01-22 2000-01-20 Techniques for implementing security on a small footprint device using a context barrier

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US235158 1999-01-22
US09/235,158 US6823520B1 (en) 1999-01-22 1999-01-22 Techniques for implementing security on a small footprint device using a context barrier
PCT/US2000/001233 WO2000043875A1 (en) 1999-01-22 2000-01-20 Techniques for implementing security on a small footprint device using a context barrier

Related Child Applications (1)

Application Number Title Priority Date Filing Date
EP04005586.5A Division EP1434121B1 (en) 1999-01-22 2000-01-20 Techniques for implementing security on a small footprint device using a context barrier

Publications (2)

Publication Number Publication Date
EP1155365A1 true EP1155365A1 (en) 2001-11-21
EP1155365B1 EP1155365B1 (en) 2004-05-06

Family

ID=22884338

Family Applications (2)

Application Number Title Priority Date Filing Date
EP00904409A Revoked EP1155365B1 (en) 1999-01-22 2000-01-20 Techniques for implementing security on a small footprint device using a context barrier
EP04005586.5A Expired - Lifetime EP1434121B1 (en) 1999-01-22 2000-01-20 Techniques for implementing security on a small footprint device using a context barrier

Family Applications After (1)

Application Number Title Priority Date Filing Date
EP04005586.5A Expired - Lifetime EP1434121B1 (en) 1999-01-22 2000-01-20 Techniques for implementing security on a small footprint device using a context barrier

Country Status (10)

Country Link
US (2) US6823520B1 (en)
EP (2) EP1155365B1 (en)
JP (1) JP4996787B2 (en)
KR (1) KR100688396B1 (en)
CN (2) CN1157655C (en)
AT (1) ATE266227T1 (en)
AU (1) AU772045B2 (en)
DE (2) DE1155365T1 (en)
HK (1) HK1041334B (en)
WO (1) WO2000043875A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10671407B2 (en) 2018-06-07 2020-06-02 Oracle International Corporation Suspending and resuming a card computing device

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6633984B2 (en) * 1999-01-22 2003-10-14 Sun Microsystems, Inc. Techniques for permitting access across a context barrier on a small footprint device using an entry point object
GB2370659A (en) * 2000-12-29 2002-07-03 Nokia Mobile Phones Ltd Method of controlling access to a data file held by a smart card
FR2864398A1 (en) * 2003-12-23 2005-06-24 France Telecom Computing device e.g. personal computer, for executing e.g. banking application, has operation profile/virtual machine execution spaces accommodated by processing device that is arranged to be non separable into two parts
US8214799B2 (en) * 2004-07-08 2012-07-03 Microsoft Corporation Providing information to an isolated hosted object via system-created variable objects
US20060010423A1 (en) * 2004-07-08 2006-01-12 Microsoft Corporation Variable namespaces and scoping for variables in an object model
KR100772455B1 (en) * 2005-06-22 2007-11-01 한국전자통신연구원 Dac strengthening apparatus and method for controlling classification and execution of process
JP4627266B2 (en) * 2006-02-16 2011-02-09 株式会社日立ソリューションズ Information leakage prevention system due to unknown malware
US20080309665A1 (en) * 2007-06-13 2008-12-18 3D Systems, Inc., A California Corporation Distributed rapid prototyping
KR101049718B1 (en) 2008-12-29 2011-07-19 에스케이 텔레콤주식회사 How to perform software separation, device, and computer-readable recording media
US8677329B2 (en) 2009-06-03 2014-03-18 Apple Inc. Methods and apparatuses for a compiler server
US9117071B2 (en) 2009-06-03 2015-08-25 Apple Inc. Methods and apparatuses for secure compilation
US8578487B2 (en) * 2010-11-04 2013-11-05 Cylance Inc. System and method for internet security
US8335921B2 (en) 2010-12-17 2012-12-18 Google, Inc. Writing application data to a secure element
US8352749B2 (en) 2010-12-17 2013-01-08 Google Inc. Local trusted services manager for a contactless smart card
US8807440B1 (en) 2010-12-17 2014-08-19 Google Inc. Routing secure element payment requests to an alternate application
US8171525B1 (en) 2011-09-15 2012-05-01 Google Inc. Enabling users to select between secure service providers using a central trusted service manager
US8255687B1 (en) 2011-09-15 2012-08-28 Google Inc. Enabling users to select between secure service providers using a key escrow service
US8313036B1 (en) 2011-09-16 2012-11-20 Google Inc. Secure application directory
US8385553B1 (en) 2012-02-28 2013-02-26 Google Inc. Portable secure element
US8429409B1 (en) 2012-04-06 2013-04-23 Google Inc. Secure reset of personal and service provider information on mobile devices
CN105302666A (en) * 2015-10-13 2016-02-03 东信和平科技股份有限公司 JAVA CARD based backup and recovery method for data in application

Family Cites Families (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61177585A (en) 1985-02-04 1986-08-09 Toshiba Corp Sealing body of portable electronic device
US4816654A (en) 1986-05-16 1989-03-28 American Telephone And Telegraph Company Improved security system for a portable data carrier
JP2514954B2 (en) * 1987-03-13 1996-07-10 三菱電機株式会社 IC card
JPH01277993A (en) 1988-04-28 1989-11-08 Toshiba Corp Portable electronic device
JPH02156357A (en) 1988-12-08 1990-06-15 Fujitsu Ltd Program destruction preventing method
US5057997A (en) * 1989-02-13 1991-10-15 International Business Machines Corp. Interruption systems for externally changing a context of program execution of a programmed processor
US5204663A (en) 1990-05-21 1993-04-20 Applied Systems Institute, Inc. Smart card access control system
ATE100229T1 (en) 1990-07-20 1994-01-15 Siemens Nixdorf Inf Syst METHOD OF PREVENTING UNAUTHORIZED DEVIATIONS FROM THE RUN LOG OF AN APPLICATION IN A DATA EXCHANGE SYSTEM.
JP3007425B2 (en) 1991-02-14 2000-02-07 凸版印刷 株式会社 IC card
US5204897A (en) 1991-06-28 1993-04-20 Digital Equipment Corporation Management interface for license management system
DE4126213C2 (en) 1991-08-08 2000-06-15 Deutsche Telekom Ag Chip card for several service providers
FR2683357A1 (en) * 1991-10-30 1993-05-07 Philips Composants MICROCIRCUIT FOR PROTECTED PROGRAMMABLE MEMORY CHIP CARD.
JPH05224956A (en) * 1992-02-14 1993-09-03 Nippon Telegr & Teleph Corp <Ntt> Inter-process message communication method
WO1994010657A1 (en) 1992-10-26 1994-05-11 Intellect Australia Pty. Ltd. Host and user transaction system
US5446901A (en) 1993-06-30 1995-08-29 Digital Equipment Corporation Fault tolerant distributed garbage collection system and method for collecting network objects
US5649118A (en) 1993-08-27 1997-07-15 Lucent Technologies Inc. Smart card with multiple charge accounts and product item tables designating the account to debit
US5544246A (en) 1993-09-17 1996-08-06 At&T Corp. Smartcard adapted for a plurality of service providers and for remote installation of same
US5481715A (en) * 1993-12-15 1996-01-02 Sun Microsystems, Inc. Method and apparatus for delegated communications in a computer system using trusted deputies
ATE152539T1 (en) 1994-02-08 1997-05-15 Belle Gate Invest Bv DATA EXCHANGE SYSTEM WITH PORTABLE DATA PROCESSING UNITS
US5930363A (en) 1995-03-17 1999-07-27 Transmo Limited Card charging systems
US5594227A (en) 1995-03-28 1997-01-14 Microsoft Corporation System and method for protecting unauthorized access to data contents
EP0819274B1 (en) * 1995-04-07 2002-11-06 DreamTechnologies Co., Ltd. Method and system for executing an application program
CA2173695A1 (en) 1995-04-14 1996-10-15 Panagiotis Kougiouris Method and system for providing interoperability among processes written to execute on different operating systems
DK0757336T3 (en) 1995-08-04 2001-03-19 Belle Gate Invest B V Data Exchange System comprising portable data processing units
US5768385A (en) 1995-08-29 1998-06-16 Microsoft Corporation Untraceable electronic cash
US5721781A (en) 1995-09-13 1998-02-24 Microsoft Corporation Authentication system and method for smart card transactions
DE19536169A1 (en) * 1995-09-29 1997-04-03 Ibm Multifunctional chip card
FR2743910B1 (en) * 1996-01-19 1998-02-27 Solaic Sa METHOD FOR IMPLEMENTING A SECURE PROGRAM IN A MICROPROCESSOR CARD AND MICROPROCESSOR CARD COMPRISING A SECURE PROGRAM
US5742756A (en) 1996-02-12 1998-04-21 Microsoft Corporation System and method of using smart cards to perform security-critical operations requiring user authorization
US5781723A (en) 1996-06-03 1998-07-14 Microsoft Corporation System and method for self-identifying a portable information device to a computing unit
ES2184066T3 (en) 1996-10-25 2003-04-01 Schlumberger Systems & Service USE OF A HIGH-LEVEL PROGRAMMING LANGUAGE WITH MICROCONTROLLER.
US5884316A (en) 1996-11-19 1999-03-16 Microsoft Corporation Implicit session context system with object state cache
CA2288824A1 (en) 1997-03-24 1998-10-01 Marc B. Kekicheff A system and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
US6220510B1 (en) * 1997-05-15 2001-04-24 Mondex International Limited Multi-application IC card with delegation feature
US6212633B1 (en) 1998-06-26 2001-04-03 Vlsi Technology, Inc. Secure data communication over a memory-mapped serial communications interface utilizing a distributed firewall
US6349336B1 (en) * 1999-04-26 2002-02-19 Hewlett-Packard Company Agent/proxy connection control across a firewall
US6292874B1 (en) * 1999-10-19 2001-09-18 Advanced Technology Materials, Inc. Memory management method and apparatus for partitioning homogeneous memory and restricting access of installed applications to predetermined memory ranges
ITMI20121303A1 (en) * 2012-07-25 2014-01-26 Wilic Sarl ROTOR OF A LARGE DIAMETER ROTARY ELECTRIC MACHINE AND ROTARY ELECTRIC MACHINE

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0043875A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10671407B2 (en) 2018-06-07 2020-06-02 Oracle International Corporation Suspending and resuming a card computing device

Also Published As

Publication number Publication date
DE60010433T2 (en) 2004-09-09
EP1434121A3 (en) 2006-04-12
KR20010108114A (en) 2001-12-07
DE1155365T1 (en) 2003-03-06
US7478389B2 (en) 2009-01-13
CN1157655C (en) 2004-07-14
KR100688396B1 (en) 2007-03-09
WO2000043875A1 (en) 2000-07-27
JP4996787B2 (en) 2012-08-08
EP1434121B1 (en) 2015-11-18
CN100507797C (en) 2009-07-01
CN1338069A (en) 2002-02-27
HK1041334A1 (en) 2002-07-05
DE60010433D1 (en) 2004-06-09
EP1434121A2 (en) 2004-06-30
AU2617200A (en) 2000-08-07
US20050091659A1 (en) 2005-04-28
US6823520B1 (en) 2004-11-23
JP2003522986A (en) 2003-07-29
CN1619455A (en) 2005-05-25
EP1155365B1 (en) 2004-05-06
HK1041334B (en) 2005-04-22
AU772045B2 (en) 2004-04-08
ATE266227T1 (en) 2004-05-15

Similar Documents

Publication Publication Date Title
EP1190316B1 (en) Techniques for permitting access across a context barrier in a small footprint device using global data structures
AU771623B2 (en) Techniques for permitting access across a context barrier on a small footprint device using an entry point object
JP5483768B2 (en) Technology that allows access across context barriers using runtime environment privileges in small area devices
AU772045B2 (en) Techniques for implementing security on a small footprint device using a context barrier
AU773772B2 (en) Techniques for permitting access across a context barrier in a small footprint device using shared object interfaces
AU2004200537A1 (en) Techniques for implementing security on a small footprint device using a context barrier
AU2004200637A1 (en) Techniques for permitting access across a context barrier on a small footprint device using run time environment privileges
AU2004200758A1 (en) Techniques for permitting access across a context barrier on a small footprint device using an entry point object

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20010822

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

EL Fr: translation of claims filed
TCAT At: translation of patent claims filed
DET De: translation of patent claims
17Q First examination report despatched

Effective date: 20030428

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

RIN1 Information on inventor provided before grant (corrected)

Inventor name: STREICH, ANDY

Inventor name: SUSSER, JOSHUA

Inventor name: DE JONG, EDUARD

Inventor name: BUTLER, MITCHEL, B.

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT DE FR GB IE

RIN1 Information on inventor provided before grant (corrected)

Inventor name: SUSSER, JOSHUA

Inventor name: DE JONG, EDUARD

Inventor name: BUTLER, MITCHEL, B.

Inventor name: STREICH, ANDY

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REF Corresponds to:

Ref document number: 60010433

Country of ref document: DE

Date of ref document: 20040609

Kind code of ref document: P

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

LTIE Lt: invalidation of european patent or patent extension

Effective date: 20040506

ET Fr: translation filed
PLBI Opposition filed

Free format text: ORIGINAL CODE: 0009260

REG Reference to a national code

Ref country code: FR

Ref legal event code: CA

PLAQ Examination of admissibility of opposition: information related to despatch of communication + time limit deleted

Free format text: ORIGINAL CODE: EPIDOSDOPE2

PLAR Examination of admissibility of opposition: information related to receipt of reply deleted

Free format text: ORIGINAL CODE: EPIDOSDOPE4

PLBQ Unpublished change to opponent data

Free format text: ORIGINAL CODE: EPIDOS OPPO

PLAB Opposition data, opponent's data or that of the opponent's representative modified

Free format text: ORIGINAL CODE: 0009299OPPO

PLAX Notice of opposition and request to file observation + time limit sent

Free format text: ORIGINAL CODE: EPIDOSNOBS2

26 Opposition filed

Opponent name: GIESECKE & DEVRIENT GMBH

Effective date: 20050201

R26 Opposition filed (corrected)

Opponent name: GIESECKE & DEVRIENT GMBH

Effective date: 20050201

PLAF Information modified related to communication of a notice of opposition and request to file observations + time limit

Free format text: ORIGINAL CODE: EPIDOSCOBS2

PLBB Reply of patent proprietor to notice(s) of opposition received

Free format text: ORIGINAL CODE: EPIDOSNOBS3

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: AT

Payment date: 20070111

Year of fee payment: 8

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080120

RDAF Communication despatched that patent is revoked

Free format text: ORIGINAL CODE: EPIDOSNREV1

APBM Appeal reference recorded

Free format text: ORIGINAL CODE: EPIDOSNREFNO

APBP Date of receipt of notice of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA2O

APAH Appeal reference modified

Free format text: ORIGINAL CODE: EPIDOSCREFNO

RAP2 Party data changed (patent owner data changed or rights of a patent transferred)

Owner name: ORACLE AMERICA, INC.

APBQ Date of receipt of statement of grounds of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA3O

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 17

APBU Appeal procedure closed

Free format text: ORIGINAL CODE: EPIDOSNNOA9O

PLAY Examination report in opposition despatched + time limit

Free format text: ORIGINAL CODE: EPIDOSNORE2

PLBC Reply to examination report in opposition received

Free format text: ORIGINAL CODE: EPIDOSNORE3

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20161215

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20170117

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20170118

Year of fee payment: 18

Ref country code: IE

Payment date: 20170109

Year of fee payment: 18

RDAE Information deleted related to despatch of communication that patent is revoked

Free format text: ORIGINAL CODE: EPIDOSDREV1

RDAF Communication despatched that patent is revoked

Free format text: ORIGINAL CODE: EPIDOSNREV1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

REG Reference to a national code

Ref country code: DE

Ref legal event code: R064

Ref document number: 60010433

Country of ref document: DE

Ref country code: DE

Ref legal event code: R103

Ref document number: 60010433

Country of ref document: DE

RDAG Patent revoked

Free format text: ORIGINAL CODE: 0009271

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: PATENT REVOKED

27W Patent revoked

Effective date: 20170720

GBPR Gb: patent revoked under art. 102 of the ep convention designating the uk as contracting state

Effective date: 20170720

REG Reference to a national code

Ref country code: AT

Ref legal event code: MA03

Ref document number: 266227

Country of ref document: AT

Kind code of ref document: T

Effective date: 20170720

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: PATENT REVOKED